Dual Boot unencrypted Windows 10 + encrypted Ubuntu 14.04
I have Windows 10 installed on my laptop and I want to install Ubuntu 14.04 in encrypted form so I can boot into a non encrypted Windows 10 or an encrypted Ubuntu 14.04.
I have booted into the laptop using an Ubuntu 14.04 live cd and this is what the current partitions look like:
If I then start the Ubuntu 14.04 installation and select "something else" from the partition screen, I get this:
What do I need to do to the unused space in order to install Ubuntu 14.04 in encrypted form?
I have read many existing questions, but find them very confusing.
14.04 dual-boot encryption windows-10
add a comment |
I have Windows 10 installed on my laptop and I want to install Ubuntu 14.04 in encrypted form so I can boot into a non encrypted Windows 10 or an encrypted Ubuntu 14.04.
I have booted into the laptop using an Ubuntu 14.04 live cd and this is what the current partitions look like:
If I then start the Ubuntu 14.04 installation and select "something else" from the partition screen, I get this:
What do I need to do to the unused space in order to install Ubuntu 14.04 in encrypted form?
I have read many existing questions, but find them very confusing.
14.04 dual-boot encryption windows-10
Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.
– bain
Jan 16 '16 at 11:52
add a comment |
I have Windows 10 installed on my laptop and I want to install Ubuntu 14.04 in encrypted form so I can boot into a non encrypted Windows 10 or an encrypted Ubuntu 14.04.
I have booted into the laptop using an Ubuntu 14.04 live cd and this is what the current partitions look like:
If I then start the Ubuntu 14.04 installation and select "something else" from the partition screen, I get this:
What do I need to do to the unused space in order to install Ubuntu 14.04 in encrypted form?
I have read many existing questions, but find them very confusing.
14.04 dual-boot encryption windows-10
I have Windows 10 installed on my laptop and I want to install Ubuntu 14.04 in encrypted form so I can boot into a non encrypted Windows 10 or an encrypted Ubuntu 14.04.
I have booted into the laptop using an Ubuntu 14.04 live cd and this is what the current partitions look like:
If I then start the Ubuntu 14.04 installation and select "something else" from the partition screen, I get this:
What do I need to do to the unused space in order to install Ubuntu 14.04 in encrypted form?
I have read many existing questions, but find them very confusing.
14.04 dual-boot encryption windows-10
14.04 dual-boot encryption windows-10
asked Jan 16 '16 at 10:26
oshirowanenoshirowanen
1,250185991
1,250185991
Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.
– bain
Jan 16 '16 at 11:52
add a comment |
Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.
– bain
Jan 16 '16 at 11:52
Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.
– bain
Jan 16 '16 at 11:52
Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.
– bain
Jan 16 '16 at 11:52
add a comment |
2 Answers
2
active
oldest
votes
If you want to perform a "full disk encryption" of your Ubuntu installation do the following:
- Boot live cd
- Open gparted
- Create 3 partitions:
- boot (ext2) - If you have Windows installed with UEFI, this can be skipped,
- root (ext4),
- swap (linux-swap)
- Apply changes
- Open terminal and sudo -i
Encrypt volumes root and swap
cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash
sha512 --iter-time 2000 /dev/sdax
Name the encrypted volumes
cryptsetup luksOpen /dev/sda2 root
cryptsetup luksOpen /dev/sda3 swap
Make an ext4 filesystem inside and a swap space
mkfs.ext4 /dev/mapper/root
mkswap /dev/mapper/swap
- Proceed with OS installation
- Select Something else
- Set boot, root and swap partitions (Select each partition, press
Change and set the appropriate values) - Continue with installation. Press Install now.
- After installation is finished choose Continue testing
- Open terminal and sudo -i
Chroot Magic
cd /mnt
mkdir root
mount /dev/mapper/root root
mount /dev/sda1 root/boot
chroot root
mount -t proc proc /proc
mount -t sysfs sys /sys
mount -o bind /dev root/dev
Block Device & Filesystem Tables
nano /etc/crypttab
Open a second terminal
sudo blkid
Enter the following content to the crypttab file
root UUID= (find it from blkid) none luks
swap UUID= (find it from blkid) none luks,swap
- Save and exit
- Open the file /etc/fstab and check that it has the root and swap
entries - Fix Hibernate and Update Init.
Open with nano /etc/initramfs-tools/conf.d/resume and make the
following change
RESUME=/dev/mapper/swap
Run in terminal the following command
update-initramfs -u
exit
LUKS Header Backup. Open terminal and run the following commands
cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
exit
The above guide was based on this
1
I am puzzled. It seems to me that you are settingsda2
andsda3
to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.
– Paddy Landau
Aug 11 '16 at 13:35
1
The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.
– cure
Aug 16 '16 at 11:05
-1 for broken Chroot magic.
– David Foerster
Dec 29 '18 at 9:49
add a comment |
I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.
Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.
I may be wrong here and this is not what you're asking, tho.
1
encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...
– Lilás
Dec 2 '16 at 15:25
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f721714%2fdual-boot-unencrypted-windows-10-encrypted-ubuntu-14-04%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
If you want to perform a "full disk encryption" of your Ubuntu installation do the following:
- Boot live cd
- Open gparted
- Create 3 partitions:
- boot (ext2) - If you have Windows installed with UEFI, this can be skipped,
- root (ext4),
- swap (linux-swap)
- Apply changes
- Open terminal and sudo -i
Encrypt volumes root and swap
cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash
sha512 --iter-time 2000 /dev/sdax
Name the encrypted volumes
cryptsetup luksOpen /dev/sda2 root
cryptsetup luksOpen /dev/sda3 swap
Make an ext4 filesystem inside and a swap space
mkfs.ext4 /dev/mapper/root
mkswap /dev/mapper/swap
- Proceed with OS installation
- Select Something else
- Set boot, root and swap partitions (Select each partition, press
Change and set the appropriate values) - Continue with installation. Press Install now.
- After installation is finished choose Continue testing
- Open terminal and sudo -i
Chroot Magic
cd /mnt
mkdir root
mount /dev/mapper/root root
mount /dev/sda1 root/boot
chroot root
mount -t proc proc /proc
mount -t sysfs sys /sys
mount -o bind /dev root/dev
Block Device & Filesystem Tables
nano /etc/crypttab
Open a second terminal
sudo blkid
Enter the following content to the crypttab file
root UUID= (find it from blkid) none luks
swap UUID= (find it from blkid) none luks,swap
- Save and exit
- Open the file /etc/fstab and check that it has the root and swap
entries - Fix Hibernate and Update Init.
Open with nano /etc/initramfs-tools/conf.d/resume and make the
following change
RESUME=/dev/mapper/swap
Run in terminal the following command
update-initramfs -u
exit
LUKS Header Backup. Open terminal and run the following commands
cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
exit
The above guide was based on this
1
I am puzzled. It seems to me that you are settingsda2
andsda3
to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.
– Paddy Landau
Aug 11 '16 at 13:35
1
The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.
– cure
Aug 16 '16 at 11:05
-1 for broken Chroot magic.
– David Foerster
Dec 29 '18 at 9:49
add a comment |
If you want to perform a "full disk encryption" of your Ubuntu installation do the following:
- Boot live cd
- Open gparted
- Create 3 partitions:
- boot (ext2) - If you have Windows installed with UEFI, this can be skipped,
- root (ext4),
- swap (linux-swap)
- Apply changes
- Open terminal and sudo -i
Encrypt volumes root and swap
cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash
sha512 --iter-time 2000 /dev/sdax
Name the encrypted volumes
cryptsetup luksOpen /dev/sda2 root
cryptsetup luksOpen /dev/sda3 swap
Make an ext4 filesystem inside and a swap space
mkfs.ext4 /dev/mapper/root
mkswap /dev/mapper/swap
- Proceed with OS installation
- Select Something else
- Set boot, root and swap partitions (Select each partition, press
Change and set the appropriate values) - Continue with installation. Press Install now.
- After installation is finished choose Continue testing
- Open terminal and sudo -i
Chroot Magic
cd /mnt
mkdir root
mount /dev/mapper/root root
mount /dev/sda1 root/boot
chroot root
mount -t proc proc /proc
mount -t sysfs sys /sys
mount -o bind /dev root/dev
Block Device & Filesystem Tables
nano /etc/crypttab
Open a second terminal
sudo blkid
Enter the following content to the crypttab file
root UUID= (find it from blkid) none luks
swap UUID= (find it from blkid) none luks,swap
- Save and exit
- Open the file /etc/fstab and check that it has the root and swap
entries - Fix Hibernate and Update Init.
Open with nano /etc/initramfs-tools/conf.d/resume and make the
following change
RESUME=/dev/mapper/swap
Run in terminal the following command
update-initramfs -u
exit
LUKS Header Backup. Open terminal and run the following commands
cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
exit
The above guide was based on this
1
I am puzzled. It seems to me that you are settingsda2
andsda3
to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.
– Paddy Landau
Aug 11 '16 at 13:35
1
The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.
– cure
Aug 16 '16 at 11:05
-1 for broken Chroot magic.
– David Foerster
Dec 29 '18 at 9:49
add a comment |
If you want to perform a "full disk encryption" of your Ubuntu installation do the following:
- Boot live cd
- Open gparted
- Create 3 partitions:
- boot (ext2) - If you have Windows installed with UEFI, this can be skipped,
- root (ext4),
- swap (linux-swap)
- Apply changes
- Open terminal and sudo -i
Encrypt volumes root and swap
cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash
sha512 --iter-time 2000 /dev/sdax
Name the encrypted volumes
cryptsetup luksOpen /dev/sda2 root
cryptsetup luksOpen /dev/sda3 swap
Make an ext4 filesystem inside and a swap space
mkfs.ext4 /dev/mapper/root
mkswap /dev/mapper/swap
- Proceed with OS installation
- Select Something else
- Set boot, root and swap partitions (Select each partition, press
Change and set the appropriate values) - Continue with installation. Press Install now.
- After installation is finished choose Continue testing
- Open terminal and sudo -i
Chroot Magic
cd /mnt
mkdir root
mount /dev/mapper/root root
mount /dev/sda1 root/boot
chroot root
mount -t proc proc /proc
mount -t sysfs sys /sys
mount -o bind /dev root/dev
Block Device & Filesystem Tables
nano /etc/crypttab
Open a second terminal
sudo blkid
Enter the following content to the crypttab file
root UUID= (find it from blkid) none luks
swap UUID= (find it from blkid) none luks,swap
- Save and exit
- Open the file /etc/fstab and check that it has the root and swap
entries - Fix Hibernate and Update Init.
Open with nano /etc/initramfs-tools/conf.d/resume and make the
following change
RESUME=/dev/mapper/swap
Run in terminal the following command
update-initramfs -u
exit
LUKS Header Backup. Open terminal and run the following commands
cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
exit
The above guide was based on this
If you want to perform a "full disk encryption" of your Ubuntu installation do the following:
- Boot live cd
- Open gparted
- Create 3 partitions:
- boot (ext2) - If you have Windows installed with UEFI, this can be skipped,
- root (ext4),
- swap (linux-swap)
- Apply changes
- Open terminal and sudo -i
Encrypt volumes root and swap
cryptsetup luksFormat --cipher aes-xts-plain --key-size 512 --hash
sha512 --iter-time 2000 /dev/sdax
Name the encrypted volumes
cryptsetup luksOpen /dev/sda2 root
cryptsetup luksOpen /dev/sda3 swap
Make an ext4 filesystem inside and a swap space
mkfs.ext4 /dev/mapper/root
mkswap /dev/mapper/swap
- Proceed with OS installation
- Select Something else
- Set boot, root and swap partitions (Select each partition, press
Change and set the appropriate values) - Continue with installation. Press Install now.
- After installation is finished choose Continue testing
- Open terminal and sudo -i
Chroot Magic
cd /mnt
mkdir root
mount /dev/mapper/root root
mount /dev/sda1 root/boot
chroot root
mount -t proc proc /proc
mount -t sysfs sys /sys
mount -o bind /dev root/dev
Block Device & Filesystem Tables
nano /etc/crypttab
Open a second terminal
sudo blkid
Enter the following content to the crypttab file
root UUID= (find it from blkid) none luks
swap UUID= (find it from blkid) none luks,swap
- Save and exit
- Open the file /etc/fstab and check that it has the root and swap
entries - Fix Hibernate and Update Init.
Open with nano /etc/initramfs-tools/conf.d/resume and make the
following change
RESUME=/dev/mapper/swap
Run in terminal the following command
update-initramfs -u
exit
LUKS Header Backup. Open terminal and run the following commands
cryptsetup luksHeaderBackup /dev/sda2 --header-backup-file /root/root.img
cryptsetup luksHeaderBackup /dev/sda3 --header-backup-file /root/swap.img
exit
The above guide was based on this
edited Dec 29 '18 at 12:00
Eduardo Chico
31
31
answered Jan 16 '16 at 12:10
curecure
393
393
1
I am puzzled. It seems to me that you are settingsda2
andsda3
to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.
– Paddy Landau
Aug 11 '16 at 13:35
1
The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.
– cure
Aug 16 '16 at 11:05
-1 for broken Chroot magic.
– David Foerster
Dec 29 '18 at 9:49
add a comment |
1
I am puzzled. It seems to me that you are settingsda2
andsda3
to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.
– Paddy Landau
Aug 11 '16 at 13:35
1
The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.
– cure
Aug 16 '16 at 11:05
-1 for broken Chroot magic.
– David Foerster
Dec 29 '18 at 9:49
1
1
I am puzzled. It seems to me that you are setting
sda2
and sda3
to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.– Paddy Landau
Aug 11 '16 at 13:35
I am puzzled. It seems to me that you are setting
sda2
and sda3
to root and swap respectively, but surely that would overwrite the OP's Windows partitions? And even before then, you suggest creating a new partition table — surely that will delete all existing partitions, thereby destroying the existing Windows partitions, even the Windows recovery partition? Unless I am totally confused, your suggestion will destroy the OP's Windows setup, which is exactly the opposite of what was wanted.– Paddy Landau
Aug 11 '16 at 13:35
1
1
The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.
– cure
Aug 16 '16 at 11:05
The guide is meant to be generic so that it can be used in most of the cases with some alterations. You are correct, sda2 and sda3 should be replaced with the newly created partitions and of course no need to create a partition table, since one already exists.
– cure
Aug 16 '16 at 11:05
-1 for broken Chroot magic.
– David Foerster
Dec 29 '18 at 9:49
-1 for broken Chroot magic.
– David Foerster
Dec 29 '18 at 9:49
add a comment |
I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.
Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.
I may be wrong here and this is not what you're asking, tho.
1
encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...
– Lilás
Dec 2 '16 at 15:25
add a comment |
I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.
Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.
I may be wrong here and this is not what you're asking, tho.
1
encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...
– Lilás
Dec 2 '16 at 15:25
add a comment |
I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.
Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.
I may be wrong here and this is not what you're asking, tho.
I don't see any problems here, install Ubuntu normally on the unused space (you can do some partition stuff like choosing different partitions for different folders etc. but if you don't want to do that, it's ok), during the installation progress, there will be an option called "encrypt my home folder" or something like that, check it, and you're pretty much done.
Even easier you can just make Windows take all the space, and check the option "Install Ubuntu alongside Windows", and it will show a very foolproof interface to you.
I may be wrong here and this is not what you're asking, tho.
answered Jan 16 '16 at 11:49
prrgprrg
1
1
1
encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...
– Lilás
Dec 2 '16 at 15:25
add a comment |
1
encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...
– Lilás
Dec 2 '16 at 15:25
1
1
encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...
– Lilás
Dec 2 '16 at 15:25
encrypt home folder will only encrypt the home folder, what if you want to protect /tmp ? /lib ? /usr/lib ? ...
– Lilás
Dec 2 '16 at 15:25
add a comment |
Thanks for contributing an answer to Ask Ubuntu!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f721714%2fdual-boot-unencrypted-windows-10-encrypted-ubuntu-14-04%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Do you just want to encrypt the home directories? If so, go ahead and install and check the option when it appears.
– bain
Jan 16 '16 at 11:52