Compared to Canonical who is too busy wasting time to implement Snap garbage instead of fixing hibernation, even the normal one!
But yeah they think they can just hide the hibernate button and all is fine, nobody will notice it, at the same time working like help to push their Snap crap that nobody wants!
Announcement
Collapse
No announcement yet.
Google Working On Linux Encrypted Hibernation Support
Collapse
X
-
Originally posted by anarki2 View PostThey might as well fix unencrypted hibernation first. It literally never ever worked for me.
- Likes 1
Leave a comment:
-
They might as well fix unencrypted hibernation first. It literally never ever worked for me.
- Likes 1
Leave a comment:
-
Originally posted by schmidtbag View PostEncrypted hibernation isn't something I ever thought about but it is a good idea.
- Likes 3
Leave a comment:
-
Encrypted hibernation isn't something I ever thought about but it is a good idea.
- Likes 1
Leave a comment:
-
Originally posted by Old Grouch View PostI use two partitions on my SSD - a non-encrypted ESP, and a LUKS encrypted partition which contains LVM encrypted volumes, including /boot. One of the LVM volumes is swap. So my hibernate is encrypted.
I'm obviously ignorant of the benefits of Google's approach here: could someone outline the benefits compared to my set-up?
Now, malicious userspace already has the potential to do pretty much all damage it may want to (including stealing and/or wiping your data), I'm not convinced of the direct benefits for regular desktop use-cases. An indirect benefit may be that hibernation may finally work with integrity lockdown enabled, which includes by default most distributions on Secure Boot systems.
- Likes 6
Leave a comment:
-
Love to see this change. I already do hibernation to encrypted swap based on TPM but it took a while to figure out. An automatic way to set it up and rejection of resuming from unencrypted snapshot would boost ease of use and confidence.
Originally posted by gfunk View Postan easier way to setup the unlocking of an encrypted drive via TPM
- Likes 5
Leave a comment:
-
I use two partitions on my SSD - a non-encrypted ESP, and a LUKS encrypted partition which contains LVM encrypted volumes, including /boot. One of the LVM volumes is swap. So my hibernate is encrypted.
I'm obviously ignorant of the benefits of Google's approach here: could someone outline the benefits compared to my set-up?
- Likes 1
Leave a comment:
-
good to see.. I think a lot of people are using unencrypted swap partitions for hibernation
also be nice to see an easier way to setup the unlocking of an encrypted drive via TPM although I guess this is down to how/if distros offer it
- Likes 10
Leave a comment:
Leave a comment: