Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

6
  • 1
    If you want to portable encrypted system, please consider an installed system with a LUKS encrypted LVM volume. This can be done via the standard installer of several Linux systems, for example Ubuntu. I am not sure about Debian, but I think it is available there too. Otherwise you can create it yourself. I think it is easier with an installed system than with a live system. Commented Dec 7, 2021 at 14:24
  • Why do you want automatic decryption? If I understand correctly, that would defeat the purpose of the encryption. Commented Dec 7, 2021 at 14:27
  • Actually my only concern is to protect the filesystem.squashfs present in the ISO. Let's say if I distribute this ISO, I don't want someone to be able to view the contents of squashfs as it contains sensitive data. The installed device will itself be secure enough so I don't need encrypted partitions there. Commented Dec 8, 2021 at 5:44
  • I'm trying to use the automatic decryption part so I don't have to share the password as I mentioned once the system is installed all data on it will be completely secure. The objective here is to protect the squashfs on the ISO only. Commented Dec 8, 2021 at 5:48
  • Mayb there is some step, that I do not understand, that makes it safe, even with automatic decryption. Anyway, see the answer by F. Hauri at this link. Scroll down to 'Debian live with encrypted persistence'. Good luck :-) Commented Dec 8, 2021 at 7:17