Skip to content
This repository has been archived by the owner on Jan 5, 2024. It is now read-only.

Commit

Permalink
Update docs
Browse files Browse the repository at this point in the history
  • Loading branch information
Allie Crevier committed Nov 7, 2019
1 parent 9720fc9 commit bb5f9a7
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,14 +12,16 @@ TBD

We support luks-encrypted drives that are either MBR/DOS partitioned or GPT partitioned. If you use `Disks` in Linux to partition your drive, you can [follow these instructions](https://docs.securedrop.org/en/stable/set_up_transfer_and_export_device.html#create-usb-transfer-device) to create a new export device. You can also use [cryptsetup](https://linux.die.net/man/8/cryptsetup) to create a luks-encrypted device with full-disk encryption, for example:

1. `sudo cryptsetup luksFormat --hash=sha512 --key-size=512 DEVICE` where `DEIVCE` is the name of your removable drive, which you can find via `lsblk -p`.
1. `sudo cryptsetup luksFormat --hash=sha512 --key-size=512 DEVICE` where `DEVICE` is the name of your removable drive, which you can find via `lsblk -p`.

Make sure `DEVICE` is correct because you will be overwriting its data irrevocably.

2. `sudo cryptsetup luksOpen /dev/sdb encrypted_device`

3. `sudo mkfs.ext4 /dev/mapper/encrypted_device`

4. `sudo cryptsetup luksClose /dev/mapper/encrypted_device`

We do not yet support drives that use full-disk encryption with VeraCrypt.

## Export Archive Format
Expand Down

0 comments on commit bb5f9a7

Please sign in to comment.