You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 8, 2022. It is now read-only.
Shamelessly stolen from @HulaHoopWhonix via github/usbkill:
I don't know if custom commands are supported but nuking cryptsetup keyslots would be a good option.
The text was updated successfully, but these errors were encountered:
According to https://wiki.archlinux.org/index.php/Dm-crypt/Device_Encryption : luksErase is used to quickly remove all active keys.
So, that would probably be a good idea to use.
Though, testing this will require a VM as to ensure I don't nuke any system I'm testing on.
Looking at https://superuser.com/a/1168933 , there will be a prompt that requires a YES input. echo -n "YES" | cryptsetup luksErase /dev/sdaX - should work for this, but I'll have to test.
I labeled this "Custom Commands", as this'll be something that will be a lot easier to setup when custom commands are done.
Any custom commands won't be officially supported, so any issues with them won't be addressed.
Shamelessly stolen from @HulaHoopWhonix via github/usbkill:
I don't know if custom commands are supported but nuking cryptsetup keyslots would be a good option.
The text was updated successfully, but these errors were encountered: