https://itunes.apple.com/de/app/macos-sierra/id1127487414?l=en&mt=12
Link: canonical Link: amphtml Close Ad Link: http://www.macworld.com * Subscribe ▲ Learn more about Macworld's Digital Edition Macworld Magazine Cover
https://itunes.apple.com/de/app/macos-sierra/id1127487414?l=en&mt=12
Link: canonical Link: amphtml Close Ad Link: http://www.macworld.com * Subscribe ▲ Learn more about Macworld's Digital Edition Macworld Magazine Cover
<html> | |
<head> | |
<title>Start</title> | |
<link rel="stylesheet" type="text/css" href="./style.css" /> | |
</head> | |
<body> | |
<div class="grid"> | |
<div class="square new"> | |
<div>New Tab.</div> | |
</div> |
To improve collaboration this guide is now available on GitHub.
There are multiple ways to get a full disk encrypted arch linux system on raspberry. In this tutorial, we will install a 64-bit arch linux armv8 system, using dropbear as ssh server for remote pre-boot unlocking of the root filesystem. However, it will still be possible to unlock and use the pi as usual, with a keyboard and monitor. We will also create an unencrypted partition in the installation process, usable as a rescue system.
Differences to the 32-bit arch linux arm version:
If you're aiming for a seamless Arch Linux installation in UEFI mode, follow along as this guide will walk you through the process step by step. We'll be using LUKS (Linux Unified Key Setup) and LVM (Logical Volume Manager) partitions on LUKS to achieve full disk encryption.
Note: I have updated this doc for UEFI mode. For those with BIOS/MBR systems, you can refer to the previous version, but keep in mind that it might be outdated and no longer accurate.
If you're only interested in installing Linux and not setting up dual boot with Windows, feel free to skip the Windows-related sections.
This guide provides instructions for an Arch Linux installation featuring full-disk encryption via LVM on LUKS and an encrypted boot partition (GRUB) for UEFI systems.
Following the main installation are further instructions to harden against Evil Maid attacks via UEFI Secure Boot custom key enrollment and self-signed kernel and bootloader.
You will find most of this information pulled from the Arch Wiki and other resources linked thereof.
Note: The system was installed on an NVMe SSD, substitute /dev/nvme0nX
with /dev/sdX
or your device as needed.