Use YubiKey to unlock a LUKS partition
-
Updated
May 6, 2024 - Shell
Use YubiKey to unlock a LUKS partition
FIDO2 as strong single factor for LUKS encryption
Remotely unlock LUKS-encrypted disks
Minimal Docker image repo for running cryptomator-cli's webdav server within a container.
Additional mount scripts for DM-Crypt containers
Automount a disk encripted with LUKS using a remote key
Ansible: TCPlay secured storage
This is a helper script to manage removable crypto disks on a Linux host for backup purposes. The idea is to run the script and mount available crypto disks and to unmount them if they are not needed for operation or when disks are moved to an offsite location.
ArchLinux User Repository Package for yubikey-full-disk-encryption
"ZFS_Mirrored_Encrypted_Setup.sh" is a Bash script designed for setting up a mirrored ZFS pool with encrypted datasets. It guides the user through selecting two disks, creating a mirrored ZFS pool, and establishing an encrypted ZFS dataset with a user-provided passphrase.
A shell script for securely wiping drives (i.e. SSD/Flash Drives, or HDD).
This package allows you to unlock your LUKS volumes with Yubikey and your password, meaning it uses 2-factor authentication.
Add a description, image, and links to the disk-encryption topic page so that developers can more easily learn about it.
To associate your repository with the disk-encryption topic, visit your repo's landing page and select "manage topics."