TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Invisible Arch Linux

30 点作者 jhabdas超过 5 年前

4 条评论

smitty1e超过 5 年前
&gt; When individuals speak of doing “big fist pumps” after their Arch installs successfully boot<p>After <a href="http:&#x2F;&#x2F;linuxfromscratch.org&#x2F;" rel="nofollow">http:&#x2F;&#x2F;linuxfromscratch.org&#x2F;</a> and <a href="https:&#x2F;&#x2F;gentoo.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;gentoo.org&#x2F;</a>, Arch seems a relatively smooth project.<p>&gt; This was my journey to my first install. It was an encrypted one.<p>OK, this might be on the gnarly side.<p>Arch is that fellow in the neighborhood who doesn&#x27;t say much, seems generally squared away, and is great to know when the fertilizer hits the air circulator.<p>Thanks, Arch!
评论 #21881326 未加载
ohazi超过 5 年前
If anyone is tempted to try encrypting their boot partition like I was last week, allow me to save you some trouble.<p>Yes, GRUB can technically decrypt a LUKS1 partition, but since the kernel isn&#x27;t running yet, it has to use a standalone (slow) implementation. Takes my laptop 30 seconds to decrypt the boot partition using GRUB, and 2 seconds to decrypt the root partition once the kernel has started (same number of iterations).<p>I&#x27;m planning on replacing this mess with a systemd-boot EFI image and secure boot using my own PK.
评论 #21879777 未加载
评论 #21879534 未加载
krilly超过 5 年前
&gt;While you could deniably encrypt any system the mid-2014 Mac is special because it had a battery recall. The recall repair work gave owners the perfect excuse to shred their devices using crypto-randomness prior to service.<p>Do people really expect this stuff to hold up in court? Especially when you&#x27;ve written an entire public blog post on how to deniably encrypt one
评论 #21883050 未加载
brian_herman__超过 5 年前
Where is the faraday cage?