This is the easiest way to handle things, generally. One common approach is to leave the a boot partition unencrypted, typically mounted on /boot, and then using LUKS encryption on only the root partition. If you read it carefully, you can figure out what was originally done. Well, the first thing you need to determine is: what part of your current disks are encrypted? If you run the lsblk command, that will show you disks, partitions, and mountpoints. I imagine it'd look something like this pseudo-code `rsync -source /media/old_drive_unlocked_partition -dest /media/new_drive_unlocked_partition`
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |