A Self-Destruct Option For Linux Disk Encryption
The security-minded Kali Linux distribution has proposed a feature of adding "emergency self-destruction of LUKS" to their cryptsetup package when doing full-disk encrypted Linux installations.
Kali Linux has worked out the feature of being able to nuke an entire Linux drive's installation when entering a "nuke" password. For those using encrypted partitions with LVM and LUKS, there would be the option of adding a boot password to intentionally destroy the data on the drive.
Rather than your normal boot password to decrypt the drive, entering the "nuke" password would instead deletes all key slots to make accessing the drive's data impossible. Kali Linux developers have ported it to cryptsetup in a new GitHub repository as they solicit feedback on the feature they may include in their own Linux distribution and could be picked up by other Linux distributions.
More details on this self-destruction work can be found via the Kali.org site.
Kali Linux has worked out the feature of being able to nuke an entire Linux drive's installation when entering a "nuke" password. For those using encrypted partitions with LVM and LUKS, there would be the option of adding a boot password to intentionally destroy the data on the drive.
Rather than your normal boot password to decrypt the drive, entering the "nuke" password would instead deletes all key slots to make accessing the drive's data impossible. Kali Linux developers have ported it to cryptsetup in a new GitHub repository as they solicit feedback on the feature they may include in their own Linux distribution and could be picked up by other Linux distributions.
More details on this self-destruction work can be found via the Kali.org site.
29 Comments