mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-06-02 05:23:44 -04:00
parent
794fc2f40b
commit
1573434b29
2 changed files with 2 additions and 6 deletions
|
@ -186,10 +186,7 @@ We believe that this is currently the only practically viable approach to implem
|
||||||
|
|
||||||
### Does Qubes use full disk encryption (FDE)?
|
### Does Qubes use full disk encryption (FDE)?
|
||||||
|
|
||||||
Yes, of course!
|
By default, Qubes OS uses [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup)/[dm-crypt](https://en.wikipedia.org/wiki/Dm-crypt) to encrypt everything except the `/boot` partition.
|
||||||
Full disk encryption is enabled by default.
|
|
||||||
Specifically, we use [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup)/[dm-crypt](https://en.wikipedia.org/wiki/Dm-crypt).
|
|
||||||
You can even [manually configure your encryption parameters](/doc/custom-install/) if you like!
|
|
||||||
|
|
||||||
### What do all these terms mean?
|
### What do all these terms mean?
|
||||||
|
|
||||||
|
|
|
@ -351,8 +351,7 @@ an internal storage device.
|
||||||
|
|
||||||
<div class="alert alert-success" role="alert">
|
<div class="alert alert-success" role="alert">
|
||||||
<i class="fa fa-check-circle"></i>
|
<i class="fa fa-check-circle"></i>
|
||||||
<b>Did you know?</b> Qubes OS uses full-disk AES encryption (FDE) via LUKS by
|
<b>Did you know?</b> By default, Qubes OS uses <a href="https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup">LUKS</a>/<a href="https://en.wikipedia.org/wiki/Dm-crypt">dm-crypt</a> to encrypt everything except the `/boot` partition.
|
||||||
default.
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
As soon as you press **Done**, the installer will ask you to enter a passphrase
|
As soon as you press **Done**, the installer will ask you to enter a passphrase
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue