Where can I find instructions for a portable USB Stick version of Ubuntu that is encrypted?












1















I want a portable version of Ubuntu that I can easily carry in my pocket.
Problem is that I need it to be encrypted or it's useless. Every set of
USB stick instructions I've seen so far does not account for the ease with which one might loose a USB stick. This seems like a major issue to me. How do we claim that Ubuntu is secure, if it isn't? The average person can't even keep track of their laptops and notebooks. How are they going to keep track of a USB stick?? ...and then having lost it, instantly have a major security breach?










share|improve this question























  • LOL. Someone that cares about security stays away from USB sticks and uses a VPN with 2 or 3 way authentication."How do we claim that Ubuntu is secure, if it isn't?" what does that claim have to do with USB sticks?! Nothing. "and then having lost it, instantly have a major security breach? " My USB sticks contain ZERO client related data not does it contain passwords or ssh keys as this is a breach of the privacy laws in The Netherlands if a stick is stolen.

    – Rinzwind
    Jan 14 at 11:27











  • My passwords are in a safe and my ssh keys I fetch from an instance where i need to call someone to make them available.

    – Rinzwind
    Jan 14 at 11:29











  • 1. I don't keep ANY client related data on my personal machines. 2. My passwords are generated using an assortment of things. I don't need to secure them because you literally have to be me to know the things. Also it's not necessarily the same things for each password. Items are randomly selected from the list of things. There's more to this that I won't discuss. Security. ;-)

    – NonYaBidnezz
    Jan 14 at 12:49
















1















I want a portable version of Ubuntu that I can easily carry in my pocket.
Problem is that I need it to be encrypted or it's useless. Every set of
USB stick instructions I've seen so far does not account for the ease with which one might loose a USB stick. This seems like a major issue to me. How do we claim that Ubuntu is secure, if it isn't? The average person can't even keep track of their laptops and notebooks. How are they going to keep track of a USB stick?? ...and then having lost it, instantly have a major security breach?










share|improve this question























  • LOL. Someone that cares about security stays away from USB sticks and uses a VPN with 2 or 3 way authentication."How do we claim that Ubuntu is secure, if it isn't?" what does that claim have to do with USB sticks?! Nothing. "and then having lost it, instantly have a major security breach? " My USB sticks contain ZERO client related data not does it contain passwords or ssh keys as this is a breach of the privacy laws in The Netherlands if a stick is stolen.

    – Rinzwind
    Jan 14 at 11:27











  • My passwords are in a safe and my ssh keys I fetch from an instance where i need to call someone to make them available.

    – Rinzwind
    Jan 14 at 11:29











  • 1. I don't keep ANY client related data on my personal machines. 2. My passwords are generated using an assortment of things. I don't need to secure them because you literally have to be me to know the things. Also it's not necessarily the same things for each password. Items are randomly selected from the list of things. There's more to this that I won't discuss. Security. ;-)

    – NonYaBidnezz
    Jan 14 at 12:49














1












1








1








I want a portable version of Ubuntu that I can easily carry in my pocket.
Problem is that I need it to be encrypted or it's useless. Every set of
USB stick instructions I've seen so far does not account for the ease with which one might loose a USB stick. This seems like a major issue to me. How do we claim that Ubuntu is secure, if it isn't? The average person can't even keep track of their laptops and notebooks. How are they going to keep track of a USB stick?? ...and then having lost it, instantly have a major security breach?










share|improve this question














I want a portable version of Ubuntu that I can easily carry in my pocket.
Problem is that I need it to be encrypted or it's useless. Every set of
USB stick instructions I've seen so far does not account for the ease with which one might loose a USB stick. This seems like a major issue to me. How do we claim that Ubuntu is secure, if it isn't? The average person can't even keep track of their laptops and notebooks. How are they going to keep track of a USB stick?? ...and then having lost it, instantly have a major security breach?







live-usb usb-installation






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Jan 14 at 11:14









NonYaBidnezzNonYaBidnezz

277




277













  • LOL. Someone that cares about security stays away from USB sticks and uses a VPN with 2 or 3 way authentication."How do we claim that Ubuntu is secure, if it isn't?" what does that claim have to do with USB sticks?! Nothing. "and then having lost it, instantly have a major security breach? " My USB sticks contain ZERO client related data not does it contain passwords or ssh keys as this is a breach of the privacy laws in The Netherlands if a stick is stolen.

    – Rinzwind
    Jan 14 at 11:27











  • My passwords are in a safe and my ssh keys I fetch from an instance where i need to call someone to make them available.

    – Rinzwind
    Jan 14 at 11:29











  • 1. I don't keep ANY client related data on my personal machines. 2. My passwords are generated using an assortment of things. I don't need to secure them because you literally have to be me to know the things. Also it's not necessarily the same things for each password. Items are randomly selected from the list of things. There's more to this that I won't discuss. Security. ;-)

    – NonYaBidnezz
    Jan 14 at 12:49



















  • LOL. Someone that cares about security stays away from USB sticks and uses a VPN with 2 or 3 way authentication."How do we claim that Ubuntu is secure, if it isn't?" what does that claim have to do with USB sticks?! Nothing. "and then having lost it, instantly have a major security breach? " My USB sticks contain ZERO client related data not does it contain passwords or ssh keys as this is a breach of the privacy laws in The Netherlands if a stick is stolen.

    – Rinzwind
    Jan 14 at 11:27











  • My passwords are in a safe and my ssh keys I fetch from an instance where i need to call someone to make them available.

    – Rinzwind
    Jan 14 at 11:29











  • 1. I don't keep ANY client related data on my personal machines. 2. My passwords are generated using an assortment of things. I don't need to secure them because you literally have to be me to know the things. Also it's not necessarily the same things for each password. Items are randomly selected from the list of things. There's more to this that I won't discuss. Security. ;-)

    – NonYaBidnezz
    Jan 14 at 12:49

















LOL. Someone that cares about security stays away from USB sticks and uses a VPN with 2 or 3 way authentication."How do we claim that Ubuntu is secure, if it isn't?" what does that claim have to do with USB sticks?! Nothing. "and then having lost it, instantly have a major security breach? " My USB sticks contain ZERO client related data not does it contain passwords or ssh keys as this is a breach of the privacy laws in The Netherlands if a stick is stolen.

– Rinzwind
Jan 14 at 11:27





LOL. Someone that cares about security stays away from USB sticks and uses a VPN with 2 or 3 way authentication."How do we claim that Ubuntu is secure, if it isn't?" what does that claim have to do with USB sticks?! Nothing. "and then having lost it, instantly have a major security breach? " My USB sticks contain ZERO client related data not does it contain passwords or ssh keys as this is a breach of the privacy laws in The Netherlands if a stick is stolen.

– Rinzwind
Jan 14 at 11:27













My passwords are in a safe and my ssh keys I fetch from an instance where i need to call someone to make them available.

– Rinzwind
Jan 14 at 11:29





My passwords are in a safe and my ssh keys I fetch from an instance where i need to call someone to make them available.

– Rinzwind
Jan 14 at 11:29













1. I don't keep ANY client related data on my personal machines. 2. My passwords are generated using an assortment of things. I don't need to secure them because you literally have to be me to know the things. Also it's not necessarily the same things for each password. Items are randomly selected from the list of things. There's more to this that I won't discuss. Security. ;-)

– NonYaBidnezz
Jan 14 at 12:49





1. I don't keep ANY client related data on my personal machines. 2. My passwords are generated using an assortment of things. I don't need to secure them because you literally have to be me to know the things. Also it's not necessarily the same things for each password. Items are randomly selected from the list of things. There's more to this that I won't discuss. Security. ;-)

– NonYaBidnezz
Jan 14 at 12:49










3 Answers
3






active

oldest

votes


















0















Where can I find instructions for a portable USB Stick version of Ubuntu that is encrypted?




You can use the same instructions for any encrypted partition for Ubuntu if you want to encrypt using tools available for Linux/Ubuntu. All you need to take care of is to point to the correct device that needs encrypting. And you can do that with the "disks" option from dash.



If you want instructions based on images the ubuntuhandbook has a guide.



The command line method is shorter:



cryptsetup -v --verify-passphrase luksFormat /dev/{device}
cryptsetup luksOpen /dev/{device} backup
mkfs.ext4 /dev/mapper/backup
cryptsetup luksClose /dev/mapper/backup


where {device} is the device you want encrypted.



Mind though that encryption is not really security; it is security by obscurity. It stops some users from accessing the data but there are ways to retrieve the passphrase (a sharp knife for instance).






share|improve this answer
























  • I'll give this a whirl after work today. :-)

    – NonYaBidnezz
    Jan 14 at 19:46



















0














If you accept, that every encrypted system can be cracked, you can create an installed system in a USB drive (a fast USB 3 pendrive or USB SSD).



It is easy to install (like installed into an internal drive, but into a USB drive),




  • if you unplug the internal drive


  • when booted from a normal live Ubuntu system in another USB drive


  • run Ubuntu's standard installer (ubiquity)


  • at the partitioning page, select LVM with encryption (which is LUKS encryption)


  • continue like it were a normal installation.





This link may help: How do I install Ubuntu to a USB key? (without using Startup Disk Creator)






share|improve this answer
























  • Yes. Locks are for keeping honest people honest. A dishonest person will drive a stolen pickup truck into your living room to get your things. We still use locks though because they work, i.e. they discourage a certain amount of illicit activity just like walls, fences and encryption which we also still use for the same reasons.

    – NonYaBidnezz
    Jan 14 at 12:38











  • I believe that Full Disk Encryption only started working with USB installs using Ubuntu 18.04 and later. With previous versions, (16.04), only encrypted home works with USB.

    – C.S.Cameron
    Jan 16 at 6:13



















0














BIOS/UEFI Flash Drive with Full Disk Encryption



I have been playing with Paddy Landau's Manual Full System Encryption: https://ubuntuforums.org/showthread.php?t=2399092



Out of the box the script works UEFI only.



With a mkusb base, almost anything BIOS/UEFI is possible.




  • Start with a default mkusb Live install to flash drive (4GB or larger).


  • Next create a mkusb Persistent install to flash drive using defaults (16GB or larger).


  • As soon as mkusb finishes with the persistent install, open gparted and delete sdx4 and sdx5.


  • Refer to https://help.ubuntu.com/community/ManualFullSystemEncryption.


  • Follow Item 6.4-Detailed process: https://help.ubuntu.com/community/ManualFullSystemEncryption/DetailedProcess.


  • Complete Item 4.2.1 Creating new partitions sdx4-system, sdx5-swap* and sdx6-data*.


  • Boot the Live USB in UEFI mode.


  • Complete Item 4.2.2-Prepare for the Installer, and start the installer.


  • Run the installer per item 4.2.3-Install Ubuntu.



At this point the flash drive will be UEFI only.



enter image description here




  • Now mount the ESP boot partition and copy ESP/EFI/ubuntu/grub.cfg and overwrite ESP/boot/grub/grub.cfg.


Your Bootable flash drive will now have encrypted system, home and swap files and will boot either BIOS or UEFI.



Notes:




  • *Separate home, swap and NTFS partitions are optional.

  • Many people recommend against using swap with a bootable USB or SSD for fear of wear.

  • The swap partition, if used, can be encrypted using ecryptfs-utils.

  • The NTFS partition, if used, can be encrypted using VeraCrypt so that it can be used in both Linux and Windows.

  • If there are problems reusing the installer drive on a second encrypted install, confirm /mnt/root/ has been deleted and that the correct UUID for sdx3 has been used in fstab.

  • GParted on the encrypted drive may not work.






share|improve this answer























    Your Answer








    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "89"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1109603%2fwhere-can-i-find-instructions-for-a-portable-usb-stick-version-of-ubuntu-that-is%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    3 Answers
    3






    active

    oldest

    votes








    3 Answers
    3






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    0















    Where can I find instructions for a portable USB Stick version of Ubuntu that is encrypted?




    You can use the same instructions for any encrypted partition for Ubuntu if you want to encrypt using tools available for Linux/Ubuntu. All you need to take care of is to point to the correct device that needs encrypting. And you can do that with the "disks" option from dash.



    If you want instructions based on images the ubuntuhandbook has a guide.



    The command line method is shorter:



    cryptsetup -v --verify-passphrase luksFormat /dev/{device}
    cryptsetup luksOpen /dev/{device} backup
    mkfs.ext4 /dev/mapper/backup
    cryptsetup luksClose /dev/mapper/backup


    where {device} is the device you want encrypted.



    Mind though that encryption is not really security; it is security by obscurity. It stops some users from accessing the data but there are ways to retrieve the passphrase (a sharp knife for instance).






    share|improve this answer
























    • I'll give this a whirl after work today. :-)

      – NonYaBidnezz
      Jan 14 at 19:46
















    0















    Where can I find instructions for a portable USB Stick version of Ubuntu that is encrypted?




    You can use the same instructions for any encrypted partition for Ubuntu if you want to encrypt using tools available for Linux/Ubuntu. All you need to take care of is to point to the correct device that needs encrypting. And you can do that with the "disks" option from dash.



    If you want instructions based on images the ubuntuhandbook has a guide.



    The command line method is shorter:



    cryptsetup -v --verify-passphrase luksFormat /dev/{device}
    cryptsetup luksOpen /dev/{device} backup
    mkfs.ext4 /dev/mapper/backup
    cryptsetup luksClose /dev/mapper/backup


    where {device} is the device you want encrypted.



    Mind though that encryption is not really security; it is security by obscurity. It stops some users from accessing the data but there are ways to retrieve the passphrase (a sharp knife for instance).






    share|improve this answer
























    • I'll give this a whirl after work today. :-)

      – NonYaBidnezz
      Jan 14 at 19:46














    0












    0








    0








    Where can I find instructions for a portable USB Stick version of Ubuntu that is encrypted?




    You can use the same instructions for any encrypted partition for Ubuntu if you want to encrypt using tools available for Linux/Ubuntu. All you need to take care of is to point to the correct device that needs encrypting. And you can do that with the "disks" option from dash.



    If you want instructions based on images the ubuntuhandbook has a guide.



    The command line method is shorter:



    cryptsetup -v --verify-passphrase luksFormat /dev/{device}
    cryptsetup luksOpen /dev/{device} backup
    mkfs.ext4 /dev/mapper/backup
    cryptsetup luksClose /dev/mapper/backup


    where {device} is the device you want encrypted.



    Mind though that encryption is not really security; it is security by obscurity. It stops some users from accessing the data but there are ways to retrieve the passphrase (a sharp knife for instance).






    share|improve this answer














    Where can I find instructions for a portable USB Stick version of Ubuntu that is encrypted?




    You can use the same instructions for any encrypted partition for Ubuntu if you want to encrypt using tools available for Linux/Ubuntu. All you need to take care of is to point to the correct device that needs encrypting. And you can do that with the "disks" option from dash.



    If you want instructions based on images the ubuntuhandbook has a guide.



    The command line method is shorter:



    cryptsetup -v --verify-passphrase luksFormat /dev/{device}
    cryptsetup luksOpen /dev/{device} backup
    mkfs.ext4 /dev/mapper/backup
    cryptsetup luksClose /dev/mapper/backup


    where {device} is the device you want encrypted.



    Mind though that encryption is not really security; it is security by obscurity. It stops some users from accessing the data but there are ways to retrieve the passphrase (a sharp knife for instance).







    share|improve this answer












    share|improve this answer



    share|improve this answer










    answered Jan 14 at 11:50









    RinzwindRinzwind

    206k28392526




    206k28392526













    • I'll give this a whirl after work today. :-)

      – NonYaBidnezz
      Jan 14 at 19:46



















    • I'll give this a whirl after work today. :-)

      – NonYaBidnezz
      Jan 14 at 19:46

















    I'll give this a whirl after work today. :-)

    – NonYaBidnezz
    Jan 14 at 19:46





    I'll give this a whirl after work today. :-)

    – NonYaBidnezz
    Jan 14 at 19:46













    0














    If you accept, that every encrypted system can be cracked, you can create an installed system in a USB drive (a fast USB 3 pendrive or USB SSD).



    It is easy to install (like installed into an internal drive, but into a USB drive),




    • if you unplug the internal drive


    • when booted from a normal live Ubuntu system in another USB drive


    • run Ubuntu's standard installer (ubiquity)


    • at the partitioning page, select LVM with encryption (which is LUKS encryption)


    • continue like it were a normal installation.





    This link may help: How do I install Ubuntu to a USB key? (without using Startup Disk Creator)






    share|improve this answer
























    • Yes. Locks are for keeping honest people honest. A dishonest person will drive a stolen pickup truck into your living room to get your things. We still use locks though because they work, i.e. they discourage a certain amount of illicit activity just like walls, fences and encryption which we also still use for the same reasons.

      – NonYaBidnezz
      Jan 14 at 12:38











    • I believe that Full Disk Encryption only started working with USB installs using Ubuntu 18.04 and later. With previous versions, (16.04), only encrypted home works with USB.

      – C.S.Cameron
      Jan 16 at 6:13
















    0














    If you accept, that every encrypted system can be cracked, you can create an installed system in a USB drive (a fast USB 3 pendrive or USB SSD).



    It is easy to install (like installed into an internal drive, but into a USB drive),




    • if you unplug the internal drive


    • when booted from a normal live Ubuntu system in another USB drive


    • run Ubuntu's standard installer (ubiquity)


    • at the partitioning page, select LVM with encryption (which is LUKS encryption)


    • continue like it were a normal installation.





    This link may help: How do I install Ubuntu to a USB key? (without using Startup Disk Creator)






    share|improve this answer
























    • Yes. Locks are for keeping honest people honest. A dishonest person will drive a stolen pickup truck into your living room to get your things. We still use locks though because they work, i.e. they discourage a certain amount of illicit activity just like walls, fences and encryption which we also still use for the same reasons.

      – NonYaBidnezz
      Jan 14 at 12:38











    • I believe that Full Disk Encryption only started working with USB installs using Ubuntu 18.04 and later. With previous versions, (16.04), only encrypted home works with USB.

      – C.S.Cameron
      Jan 16 at 6:13














    0












    0








    0







    If you accept, that every encrypted system can be cracked, you can create an installed system in a USB drive (a fast USB 3 pendrive or USB SSD).



    It is easy to install (like installed into an internal drive, but into a USB drive),




    • if you unplug the internal drive


    • when booted from a normal live Ubuntu system in another USB drive


    • run Ubuntu's standard installer (ubiquity)


    • at the partitioning page, select LVM with encryption (which is LUKS encryption)


    • continue like it were a normal installation.





    This link may help: How do I install Ubuntu to a USB key? (without using Startup Disk Creator)






    share|improve this answer













    If you accept, that every encrypted system can be cracked, you can create an installed system in a USB drive (a fast USB 3 pendrive or USB SSD).



    It is easy to install (like installed into an internal drive, but into a USB drive),




    • if you unplug the internal drive


    • when booted from a normal live Ubuntu system in another USB drive


    • run Ubuntu's standard installer (ubiquity)


    • at the partitioning page, select LVM with encryption (which is LUKS encryption)


    • continue like it were a normal installation.





    This link may help: How do I install Ubuntu to a USB key? (without using Startup Disk Creator)







    share|improve this answer












    share|improve this answer



    share|improve this answer










    answered Jan 14 at 12:35









    sudodussudodus

    23.9k32874




    23.9k32874













    • Yes. Locks are for keeping honest people honest. A dishonest person will drive a stolen pickup truck into your living room to get your things. We still use locks though because they work, i.e. they discourage a certain amount of illicit activity just like walls, fences and encryption which we also still use for the same reasons.

      – NonYaBidnezz
      Jan 14 at 12:38











    • I believe that Full Disk Encryption only started working with USB installs using Ubuntu 18.04 and later. With previous versions, (16.04), only encrypted home works with USB.

      – C.S.Cameron
      Jan 16 at 6:13



















    • Yes. Locks are for keeping honest people honest. A dishonest person will drive a stolen pickup truck into your living room to get your things. We still use locks though because they work, i.e. they discourage a certain amount of illicit activity just like walls, fences and encryption which we also still use for the same reasons.

      – NonYaBidnezz
      Jan 14 at 12:38











    • I believe that Full Disk Encryption only started working with USB installs using Ubuntu 18.04 and later. With previous versions, (16.04), only encrypted home works with USB.

      – C.S.Cameron
      Jan 16 at 6:13

















    Yes. Locks are for keeping honest people honest. A dishonest person will drive a stolen pickup truck into your living room to get your things. We still use locks though because they work, i.e. they discourage a certain amount of illicit activity just like walls, fences and encryption which we also still use for the same reasons.

    – NonYaBidnezz
    Jan 14 at 12:38





    Yes. Locks are for keeping honest people honest. A dishonest person will drive a stolen pickup truck into your living room to get your things. We still use locks though because they work, i.e. they discourage a certain amount of illicit activity just like walls, fences and encryption which we also still use for the same reasons.

    – NonYaBidnezz
    Jan 14 at 12:38













    I believe that Full Disk Encryption only started working with USB installs using Ubuntu 18.04 and later. With previous versions, (16.04), only encrypted home works with USB.

    – C.S.Cameron
    Jan 16 at 6:13





    I believe that Full Disk Encryption only started working with USB installs using Ubuntu 18.04 and later. With previous versions, (16.04), only encrypted home works with USB.

    – C.S.Cameron
    Jan 16 at 6:13











    0














    BIOS/UEFI Flash Drive with Full Disk Encryption



    I have been playing with Paddy Landau's Manual Full System Encryption: https://ubuntuforums.org/showthread.php?t=2399092



    Out of the box the script works UEFI only.



    With a mkusb base, almost anything BIOS/UEFI is possible.




    • Start with a default mkusb Live install to flash drive (4GB or larger).


    • Next create a mkusb Persistent install to flash drive using defaults (16GB or larger).


    • As soon as mkusb finishes with the persistent install, open gparted and delete sdx4 and sdx5.


    • Refer to https://help.ubuntu.com/community/ManualFullSystemEncryption.


    • Follow Item 6.4-Detailed process: https://help.ubuntu.com/community/ManualFullSystemEncryption/DetailedProcess.


    • Complete Item 4.2.1 Creating new partitions sdx4-system, sdx5-swap* and sdx6-data*.


    • Boot the Live USB in UEFI mode.


    • Complete Item 4.2.2-Prepare for the Installer, and start the installer.


    • Run the installer per item 4.2.3-Install Ubuntu.



    At this point the flash drive will be UEFI only.



    enter image description here




    • Now mount the ESP boot partition and copy ESP/EFI/ubuntu/grub.cfg and overwrite ESP/boot/grub/grub.cfg.


    Your Bootable flash drive will now have encrypted system, home and swap files and will boot either BIOS or UEFI.



    Notes:




    • *Separate home, swap and NTFS partitions are optional.

    • Many people recommend against using swap with a bootable USB or SSD for fear of wear.

    • The swap partition, if used, can be encrypted using ecryptfs-utils.

    • The NTFS partition, if used, can be encrypted using VeraCrypt so that it can be used in both Linux and Windows.

    • If there are problems reusing the installer drive on a second encrypted install, confirm /mnt/root/ has been deleted and that the correct UUID for sdx3 has been used in fstab.

    • GParted on the encrypted drive may not work.






    share|improve this answer




























      0














      BIOS/UEFI Flash Drive with Full Disk Encryption



      I have been playing with Paddy Landau's Manual Full System Encryption: https://ubuntuforums.org/showthread.php?t=2399092



      Out of the box the script works UEFI only.



      With a mkusb base, almost anything BIOS/UEFI is possible.




      • Start with a default mkusb Live install to flash drive (4GB or larger).


      • Next create a mkusb Persistent install to flash drive using defaults (16GB or larger).


      • As soon as mkusb finishes with the persistent install, open gparted and delete sdx4 and sdx5.


      • Refer to https://help.ubuntu.com/community/ManualFullSystemEncryption.


      • Follow Item 6.4-Detailed process: https://help.ubuntu.com/community/ManualFullSystemEncryption/DetailedProcess.


      • Complete Item 4.2.1 Creating new partitions sdx4-system, sdx5-swap* and sdx6-data*.


      • Boot the Live USB in UEFI mode.


      • Complete Item 4.2.2-Prepare for the Installer, and start the installer.


      • Run the installer per item 4.2.3-Install Ubuntu.



      At this point the flash drive will be UEFI only.



      enter image description here




      • Now mount the ESP boot partition and copy ESP/EFI/ubuntu/grub.cfg and overwrite ESP/boot/grub/grub.cfg.


      Your Bootable flash drive will now have encrypted system, home and swap files and will boot either BIOS or UEFI.



      Notes:




      • *Separate home, swap and NTFS partitions are optional.

      • Many people recommend against using swap with a bootable USB or SSD for fear of wear.

      • The swap partition, if used, can be encrypted using ecryptfs-utils.

      • The NTFS partition, if used, can be encrypted using VeraCrypt so that it can be used in both Linux and Windows.

      • If there are problems reusing the installer drive on a second encrypted install, confirm /mnt/root/ has been deleted and that the correct UUID for sdx3 has been used in fstab.

      • GParted on the encrypted drive may not work.






      share|improve this answer


























        0












        0








        0







        BIOS/UEFI Flash Drive with Full Disk Encryption



        I have been playing with Paddy Landau's Manual Full System Encryption: https://ubuntuforums.org/showthread.php?t=2399092



        Out of the box the script works UEFI only.



        With a mkusb base, almost anything BIOS/UEFI is possible.




        • Start with a default mkusb Live install to flash drive (4GB or larger).


        • Next create a mkusb Persistent install to flash drive using defaults (16GB or larger).


        • As soon as mkusb finishes with the persistent install, open gparted and delete sdx4 and sdx5.


        • Refer to https://help.ubuntu.com/community/ManualFullSystemEncryption.


        • Follow Item 6.4-Detailed process: https://help.ubuntu.com/community/ManualFullSystemEncryption/DetailedProcess.


        • Complete Item 4.2.1 Creating new partitions sdx4-system, sdx5-swap* and sdx6-data*.


        • Boot the Live USB in UEFI mode.


        • Complete Item 4.2.2-Prepare for the Installer, and start the installer.


        • Run the installer per item 4.2.3-Install Ubuntu.



        At this point the flash drive will be UEFI only.



        enter image description here




        • Now mount the ESP boot partition and copy ESP/EFI/ubuntu/grub.cfg and overwrite ESP/boot/grub/grub.cfg.


        Your Bootable flash drive will now have encrypted system, home and swap files and will boot either BIOS or UEFI.



        Notes:




        • *Separate home, swap and NTFS partitions are optional.

        • Many people recommend against using swap with a bootable USB or SSD for fear of wear.

        • The swap partition, if used, can be encrypted using ecryptfs-utils.

        • The NTFS partition, if used, can be encrypted using VeraCrypt so that it can be used in both Linux and Windows.

        • If there are problems reusing the installer drive on a second encrypted install, confirm /mnt/root/ has been deleted and that the correct UUID for sdx3 has been used in fstab.

        • GParted on the encrypted drive may not work.






        share|improve this answer













        BIOS/UEFI Flash Drive with Full Disk Encryption



        I have been playing with Paddy Landau's Manual Full System Encryption: https://ubuntuforums.org/showthread.php?t=2399092



        Out of the box the script works UEFI only.



        With a mkusb base, almost anything BIOS/UEFI is possible.




        • Start with a default mkusb Live install to flash drive (4GB or larger).


        • Next create a mkusb Persistent install to flash drive using defaults (16GB or larger).


        • As soon as mkusb finishes with the persistent install, open gparted and delete sdx4 and sdx5.


        • Refer to https://help.ubuntu.com/community/ManualFullSystemEncryption.


        • Follow Item 6.4-Detailed process: https://help.ubuntu.com/community/ManualFullSystemEncryption/DetailedProcess.


        • Complete Item 4.2.1 Creating new partitions sdx4-system, sdx5-swap* and sdx6-data*.


        • Boot the Live USB in UEFI mode.


        • Complete Item 4.2.2-Prepare for the Installer, and start the installer.


        • Run the installer per item 4.2.3-Install Ubuntu.



        At this point the flash drive will be UEFI only.



        enter image description here




        • Now mount the ESP boot partition and copy ESP/EFI/ubuntu/grub.cfg and overwrite ESP/boot/grub/grub.cfg.


        Your Bootable flash drive will now have encrypted system, home and swap files and will boot either BIOS or UEFI.



        Notes:




        • *Separate home, swap and NTFS partitions are optional.

        • Many people recommend against using swap with a bootable USB or SSD for fear of wear.

        • The swap partition, if used, can be encrypted using ecryptfs-utils.

        • The NTFS partition, if used, can be encrypted using VeraCrypt so that it can be used in both Linux and Windows.

        • If there are problems reusing the installer drive on a second encrypted install, confirm /mnt/root/ has been deleted and that the correct UUID for sdx3 has been used in fstab.

        • GParted on the encrypted drive may not work.







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Jan 15 at 1:36









        C.S.CameronC.S.Cameron

        4,46911028




        4,46911028






























            draft saved

            draft discarded




















































            Thanks for contributing an answer to Ask Ubuntu!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1109603%2fwhere-can-i-find-instructions-for-a-portable-usb-stick-version-of-ubuntu-that-is%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            flock() on closed filehandle LOCK_FILE at /usr/bin/apt-mirror

            Mangá

            Eduardo VII do Reino Unido