Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
software:encryption [2015/07/30 21:07] cyril [When to mount] |
software:encryption [2015/07/30 21:39] (current) cyril [Application data and system partition] |
||
---|---|---|---|
Line 60: | Line 60: | ||
Sensitive/ | Sensitive/ | ||
- | The next step is to encrypt your whole system partition. It is necessary if your data are very sensitive and you suspect some advanced | + | The next step is to encrypt your whole system partition. It is necessary if your data are very sensitive and you suspect some hackers could try to gain access to it, to prevent from installing spy programs on it (by booting on a live OS or extracting the hard drive). |
Encrypting the whole system partition also encrypts the swap file if there is one. If you are using a swap partition you may want to encrypt it as well (a swap file on an encrypted partition). | Encrypting the whole system partition also encrypts the swap file if there is one. If you are using a swap partition you may want to encrypt it as well (a swap file on an encrypted partition). |