encryption of partitions/lvm without speakup

Alex Snow alex_snow at gmx.net
Sun Feb 27 23:07:19 EST 2011

What about just encrypting a separate partition containing just your 
home directories, then arange for that partition to be mounted late in 
the boot process after you have everything related to speach already 

On Sun, Feb 27, 2011 at 08:35:04PM -0700, Joseph C. Lininger wrote:
> The way I see it, you have basically three options.
> 1. Store an encryption key on something like a USB device. You could
> even put your entire boot partition there if you wanted. Then have the
> encrypted root fs on your hard drive. No password needed, but someone
> could steal your flash drive.
> 2. Just know that you're going to be prompted and type in the password
> when it's time. Could have the system generate tones or something to let
> you know if you need that. Have it generate another after you've
> successfully entered it so you know you don't have to try again in case
> of an error. USB method with encrypted keys is a variation on this,
> password required, and booting from USB drive.
> 3. Modify your initrd to have all components for speach. Probably you'd
> have a rather large initrd if you did that.
> I use TrueCrypt to encrypt my windows partitions and no prompt is
> available. I just have to enter the passphrase and watch for the boot
> logo. Probably will do my Linux at some point, when I have time to rip
> it all apart and put it back together with that.
> Joe
> _______________________________________________
> Speakup mailing list
> Speakup at braille.uwo.ca
> http://speech.braille.uwo.ca/mailman/listinfo/speakup

Always borrow money from a pessimist; he doesn't expect to be paid

More information about the Speakup mailing list