Dual Boot unencrypted Windows 10 + encrypted Ubuntu 14.04












5















I have Windows 10 installed on my laptop and I want to install Ubuntu 14.04 in encrypted form so I can boot into a non encrypted Windows 10 or an encrypted Ubuntu 14.04.



I have booted into the laptop using an Ubuntu 14.04 live cd and this is what the current partitions look like:



enter image description here



If I then start the Ubuntu 14.04 installation and select "something else" from the partition screen, I get this:



enter image description here



What do I need to do to the unused space in order to install Ubuntu 14.04 in encrypted form?



I have read many existing questions, but find them very confusing.










share|improve this question























  • Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.

    – bain
    Jan 16 '16 at 11:52
















5















I have Windows 10 installed on my laptop and I want to install Ubuntu 14.04 in encrypted form so I can boot into a non encrypted Windows 10 or an encrypted Ubuntu 14.04.



I have booted into the laptop using an Ubuntu 14.04 live cd and this is what the current partitions look like:



enter image description here



If I then start the Ubuntu 14.04 installation and select "something else" from the partition screen, I get this:



enter image description here



What do I need to do to the unused space in order to install Ubuntu 14.04 in encrypted form?



I have read many existing questions, but find them very confusing.










share|improve this question























  • Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.

    – bain
    Jan 16 '16 at 11:52














5












5








5


4






I have Windows 10 installed on my laptop and I want to install Ubuntu 14.04 in encrypted form so I can boot into a non encrypted Windows 10 or an encrypted Ubuntu 14.04.



I have booted into the laptop using an Ubuntu 14.04 live cd and this is what the current partitions look like:



enter image description here



If I then start the Ubuntu 14.04 installation and select "something else" from the partition screen, I get this:



enter image description here



What do I need to do to the unused space in order to install Ubuntu 14.04 in encrypted form?



I have read many existing questions, but find them very confusing.










share|improve this question














I have Windows 10 installed on my laptop and I want to install Ubuntu 14.04 in encrypted form so I can boot into a non encrypted Windows 10 or an encrypted Ubuntu 14.04.



I have booted into the laptop using an Ubuntu 14.04 live cd and this is what the current partitions look like:



enter image description here



If I then start the Ubuntu 14.04 installation and select "something else" from the partition screen, I get this:



enter image description here



What do I need to do to the unused space in order to install Ubuntu 14.04 in encrypted form?



I have read many existing questions, but find them very confusing.







14.04 dual-boot encryption windows-10






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Jan 16 '16 at 10:26









oshirowanenoshirowanen

1,250185991




1,250185991













  • Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.

    – bain
    Jan 16 '16 at 11:52



















  • Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.

    – bain
    Jan 16 '16 at 11:52

















Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.

– bain
Jan 16 '16 at 11:52





Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.

– bain
Jan 16 '16 at 11:52










2 Answers
2






active

oldest

votes


















3














If you want to perform a "full disk encryption" of your Ubuntu installation do the following:




  • Boot live cd

  • Open gparted

  • Create 3 partitions:


    • boot (ext2) - If you have Windows installed with UEFI, this can be skipped,

    • root (ext4),

    • swap (linux-swap)



  • Apply changes

  • Open terminal and sudo -i


  • Encrypt volumes root and swap



    cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash 
    sha512 --iter-time 2000 /dev/sdax



  • Name the encrypted volumes



    cryptsetup luksOpen /dev/sda2 root
    cryptsetup luksOpen /dev/sda3 swap



  • Make an ext4 filesystem inside and a swap space



    mkfs.ext4 /dev/mapper/root
    mkswap /dev/mapper/swap


  • Proceed with OS installation

  • Select Something else

  • Set boot, root and swap partitions (Select each partition, press
    Change and set the appropriate values)

  • Continue with installation. Press Install now.

  • After installation is finished choose Continue testing

  • Open terminal and sudo -i


  • Chroot Magic



    cd /mnt
    mkdir root
    mount /dev/mapper/root root
    mount /dev/sda1 root/boot
    chroot root
    mount -t proc proc /proc
    mount -t sysfs sys /sys
    mount -o bind /dev root/dev



  • Block Device & Filesystem Tables



    nano /etc/crypttab



  • Open a second terminal



    sudo blkid



  • Enter the following content to the crypttab file



    root UUID= (find it from blkid) none luks
    swap UUID= (find it from blkid) none luks,swap


  • Save and exit

  • Open the file /etc/fstab and check that it has the root and swap
    entries

  • Fix Hibernate and Update Init.


  • Open with nano /etc/initramfs-tools/conf.d/resume and make the
    following change



    RESUME=/dev/mapper/swap



  • Run in terminal the following command



    update-initramfs -u
    exit



  • LUKS Header Backup. Open terminal and run the following commands



    cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
    cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
    exit



The above guide was based on this






share|improve this answer





















  • 1





    I am puzzled. It seems to me that you are setting sda2 and sda3 to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.

    – Paddy Landau
    Aug 11 '16 at 13:35






  • 1





    The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.

    – cure
    Aug 16 '16 at 11:05











  • -1 for broken Chroot magic.

    – David Foerster
    Dec 29 '18 at 9:49



















0














I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.



Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.



I may be wrong here and this is not what you're asking, tho.






share|improve this answer



















  • 1





    encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...

    – Lilás
    Dec 2 '16 at 15:25











Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f721714%2fdual-boot-unencrypted-windows-10-encrypted-ubuntu-14-04%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























2 Answers
2






active

oldest

votes








2 Answers
2






active

oldest

votes









active

oldest

votes






active

oldest

votes









3














If you want to perform a "full disk encryption" of your Ubuntu installation do the following:




  • Boot live cd

  • Open gparted

  • Create 3 partitions:


    • boot (ext2) - If you have Windows installed with UEFI, this can be skipped,

    • root (ext4),

    • swap (linux-swap)



  • Apply changes

  • Open terminal and sudo -i


  • Encrypt volumes root and swap



    cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash 
    sha512 --iter-time 2000 /dev/sdax



  • Name the encrypted volumes



    cryptsetup luksOpen /dev/sda2 root
    cryptsetup luksOpen /dev/sda3 swap



  • Make an ext4 filesystem inside and a swap space



    mkfs.ext4 /dev/mapper/root
    mkswap /dev/mapper/swap


  • Proceed with OS installation

  • Select Something else

  • Set boot, root and swap partitions (Select each partition, press
    Change and set the appropriate values)

  • Continue with installation. Press Install now.

  • After installation is finished choose Continue testing

  • Open terminal and sudo -i


  • Chroot Magic



    cd /mnt
    mkdir root
    mount /dev/mapper/root root
    mount /dev/sda1 root/boot
    chroot root
    mount -t proc proc /proc
    mount -t sysfs sys /sys
    mount -o bind /dev root/dev



  • Block Device & Filesystem Tables



    nano /etc/crypttab



  • Open a second terminal



    sudo blkid



  • Enter the following content to the crypttab file



    root UUID= (find it from blkid) none luks
    swap UUID= (find it from blkid) none luks,swap


  • Save and exit

  • Open the file /etc/fstab and check that it has the root and swap
    entries

  • Fix Hibernate and Update Init.


  • Open with nano /etc/initramfs-tools/conf.d/resume and make the
    following change



    RESUME=/dev/mapper/swap



  • Run in terminal the following command



    update-initramfs -u
    exit



  • LUKS Header Backup. Open terminal and run the following commands



    cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
    cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
    exit



The above guide was based on this






share|improve this answer





















  • 1





    I am puzzled. It seems to me that you are setting sda2 and sda3 to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.

    – Paddy Landau
    Aug 11 '16 at 13:35






  • 1





    The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.

    – cure
    Aug 16 '16 at 11:05











  • -1 for broken Chroot magic.

    – David Foerster
    Dec 29 '18 at 9:49
















3














If you want to perform a "full disk encryption" of your Ubuntu installation do the following:




  • Boot live cd

  • Open gparted

  • Create 3 partitions:


    • boot (ext2) - If you have Windows installed with UEFI, this can be skipped,

    • root (ext4),

    • swap (linux-swap)



  • Apply changes

  • Open terminal and sudo -i


  • Encrypt volumes root and swap



    cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash 
    sha512 --iter-time 2000 /dev/sdax



  • Name the encrypted volumes



    cryptsetup luksOpen /dev/sda2 root
    cryptsetup luksOpen /dev/sda3 swap



  • Make an ext4 filesystem inside and a swap space



    mkfs.ext4 /dev/mapper/root
    mkswap /dev/mapper/swap


  • Proceed with OS installation

  • Select Something else

  • Set boot, root and swap partitions (Select each partition, press
    Change and set the appropriate values)

  • Continue with installation. Press Install now.

  • After installation is finished choose Continue testing

  • Open terminal and sudo -i


  • Chroot Magic



    cd /mnt
    mkdir root
    mount /dev/mapper/root root
    mount /dev/sda1 root/boot
    chroot root
    mount -t proc proc /proc
    mount -t sysfs sys /sys
    mount -o bind /dev root/dev



  • Block Device & Filesystem Tables



    nano /etc/crypttab



  • Open a second terminal



    sudo blkid



  • Enter the following content to the crypttab file



    root UUID= (find it from blkid) none luks
    swap UUID= (find it from blkid) none luks,swap


  • Save and exit

  • Open the file /etc/fstab and check that it has the root and swap
    entries

  • Fix Hibernate and Update Init.


  • Open with nano /etc/initramfs-tools/conf.d/resume and make the
    following change



    RESUME=/dev/mapper/swap



  • Run in terminal the following command



    update-initramfs -u
    exit



  • LUKS Header Backup. Open terminal and run the following commands



    cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
    cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
    exit



The above guide was based on this






share|improve this answer





















  • 1





    I am puzzled. It seems to me that you are setting sda2 and sda3 to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.

    – Paddy Landau
    Aug 11 '16 at 13:35






  • 1





    The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.

    – cure
    Aug 16 '16 at 11:05











  • -1 for broken Chroot magic.

    – David Foerster
    Dec 29 '18 at 9:49














3












3








3







If you want to perform a "full disk encryption" of your Ubuntu installation do the following:




  • Boot live cd

  • Open gparted

  • Create 3 partitions:


    • boot (ext2) - If you have Windows installed with UEFI, this can be skipped,

    • root (ext4),

    • swap (linux-swap)



  • Apply changes

  • Open terminal and sudo -i


  • Encrypt volumes root and swap



    cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash 
    sha512 --iter-time 2000 /dev/sdax



  • Name the encrypted volumes



    cryptsetup luksOpen /dev/sda2 root
    cryptsetup luksOpen /dev/sda3 swap



  • Make an ext4 filesystem inside and a swap space



    mkfs.ext4 /dev/mapper/root
    mkswap /dev/mapper/swap


  • Proceed with OS installation

  • Select Something else

  • Set boot, root and swap partitions (Select each partition, press
    Change and set the appropriate values)

  • Continue with installation. Press Install now.

  • After installation is finished choose Continue testing

  • Open terminal and sudo -i


  • Chroot Magic



    cd /mnt
    mkdir root
    mount /dev/mapper/root root
    mount /dev/sda1 root/boot
    chroot root
    mount -t proc proc /proc
    mount -t sysfs sys /sys
    mount -o bind /dev root/dev



  • Block Device & Filesystem Tables



    nano /etc/crypttab



  • Open a second terminal



    sudo blkid



  • Enter the following content to the crypttab file



    root UUID= (find it from blkid) none luks
    swap UUID= (find it from blkid) none luks,swap


  • Save and exit

  • Open the file /etc/fstab and check that it has the root and swap
    entries

  • Fix Hibernate and Update Init.


  • Open with nano /etc/initramfs-tools/conf.d/resume and make the
    following change



    RESUME=/dev/mapper/swap



  • Run in terminal the following command



    update-initramfs -u
    exit



  • LUKS Header Backup. Open terminal and run the following commands



    cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
    cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
    exit



The above guide was based on this






share|improve this answer















If you want to perform a "full disk encryption" of your Ubuntu installation do the following:




  • Boot live cd

  • Open gparted

  • Create 3 partitions:


    • boot (ext2) - If you have Windows installed with UEFI, this can be skipped,

    • root (ext4),

    • swap (linux-swap)



  • Apply changes

  • Open terminal and sudo -i


  • Encrypt volumes root and swap



    cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash 
    sha512 --iter-time 2000 /dev/sdax



  • Name the encrypted volumes



    cryptsetup luksOpen /dev/sda2 root
    cryptsetup luksOpen /dev/sda3 swap



  • Make an ext4 filesystem inside and a swap space



    mkfs.ext4 /dev/mapper/root
    mkswap /dev/mapper/swap


  • Proceed with OS installation

  • Select Something else

  • Set boot, root and swap partitions (Select each partition, press
    Change and set the appropriate values)

  • Continue with installation. Press Install now.

  • After installation is finished choose Continue testing

  • Open terminal and sudo -i


  • Chroot Magic



    cd /mnt
    mkdir root
    mount /dev/mapper/root root
    mount /dev/sda1 root/boot
    chroot root
    mount -t proc proc /proc
    mount -t sysfs sys /sys
    mount -o bind /dev root/dev



  • Block Device & Filesystem Tables



    nano /etc/crypttab



  • Open a second terminal



    sudo blkid



  • Enter the following content to the crypttab file



    root UUID= (find it from blkid) none luks
    swap UUID= (find it from blkid) none luks,swap


  • Save and exit

  • Open the file /etc/fstab and check that it has the root and swap
    entries

  • Fix Hibernate and Update Init.


  • Open with nano /etc/initramfs-tools/conf.d/resume and make the
    following change



    RESUME=/dev/mapper/swap



  • Run in terminal the following command



    update-initramfs -u
    exit



  • LUKS Header Backup. Open terminal and run the following commands



    cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
    cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
    exit



The above guide was based on this







share|improve this answer














share|improve this answer



share|improve this answer








edited Dec 29 '18 at 12:00









Eduardo Chico

31




31










answered Jan 16 '16 at 12:10









curecure

393




393








  • 1





    I am puzzled. It seems to me that you are setting sda2 and sda3 to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.

    – Paddy Landau
    Aug 11 '16 at 13:35






  • 1





    The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.

    – cure
    Aug 16 '16 at 11:05











  • -1 for broken Chroot magic.

    – David Foerster
    Dec 29 '18 at 9:49














  • 1





    I am puzzled. It seems to me that you are setting sda2 and sda3 to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.

    – Paddy Landau
    Aug 11 '16 at 13:35






  • 1





    The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.

    – cure
    Aug 16 '16 at 11:05











  • -1 for broken Chroot magic.

    – David Foerster
    Dec 29 '18 at 9:49








1




1





I am puzzled. It seems to me that you are setting sda2 and sda3 to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.

– Paddy Landau
Aug 11 '16 at 13:35





I am puzzled. It seems to me that you are setting sda2 and sda3 to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.

– Paddy Landau
Aug 11 '16 at 13:35




1




1





The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.

– cure
Aug 16 '16 at 11:05





The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.

– cure
Aug 16 '16 at 11:05













-1 for broken Chroot magic.

– David Foerster
Dec 29 '18 at 9:49





-1 for broken Chroot magic.

– David Foerster
Dec 29 '18 at 9:49













0














I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.



Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.



I may be wrong here and this is not what you're asking, tho.






share|improve this answer



















  • 1





    encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...

    – Lilás
    Dec 2 '16 at 15:25
















0














I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.



Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.



I may be wrong here and this is not what you're asking, tho.






share|improve this answer



















  • 1





    encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...

    – Lilás
    Dec 2 '16 at 15:25














0












0








0







I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.



Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.



I may be wrong here and this is not what you're asking, tho.






share|improve this answer













I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.



Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.



I may be wrong here and this is not what you're asking, tho.







share|improve this answer












share|improve this answer



share|improve this answer










answered Jan 16 '16 at 11:49









prrgprrg

1




1








  • 1





    encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...

    – Lilás
    Dec 2 '16 at 15:25














  • 1





    encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...

    – Lilás
    Dec 2 '16 at 15:25








1




1





encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...

– Lilás
Dec 2 '16 at 15:25





encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...

– Lilás
Dec 2 '16 at 15:25


















draft saved

draft discarded




















































Thanks for contributing an answer to Ask Ubuntu!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f721714%2fdual-boot-unencrypted-windows-10-encrypted-ubuntu-14-04%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

flock() on closed filehandle LOCK_FILE at /usr/bin/apt-mirror

Mangá

 ⁒  ․,‪⁊‑⁙ ⁖, ⁇‒※‌, †,⁖‗‌⁝    ‾‸⁘,‖⁔⁣,⁂‾
”‑,‥–,‬ ,⁀‹⁋‴⁑ ‒ ,‴⁋”‼ ⁨,‷⁔„ ‰′,‐‚ ‥‡‎“‷⁃⁨⁅⁣,⁔
⁇‘⁔⁡⁏⁌⁡‿‶‏⁨ ⁣⁕⁖⁨⁩⁥‽⁀  ‴‬⁜‟ ⁃‣‧⁕‮ …‍⁨‴ ⁩,⁚⁖‫ ,‵ ⁀,‮⁝‣‣ ⁑  ⁂– ․, ‾‽ ‏⁁“⁗‸ ‾… ‹‡⁌⁎‸‘ ‡⁏⁌‪ ‵⁛ ‎⁨ ―⁦⁤⁄⁕