aboutsummaryrefslogtreecommitdiff
path: root/SETUP.md
diff options
context:
space:
mode:
Diffstat (limited to 'SETUP.md')
-rw-r--r--SETUP.md20
1 files changed, 10 insertions, 10 deletions
diff --git a/SETUP.md b/SETUP.md
index 1812506..0aa3431 100644
--- a/SETUP.md
+++ b/SETUP.md
@@ -32,29 +32,29 @@ Setting up "Full disk encryption" is done when setting up the whole system.
You need package `cryptsetup-run`.
Install it if not done already.
-Connect the device (if removable)
-and locate its device name (first column):
+Connect the disk (if removable)
+and locate its name (first column):
lsblk --paths --nodeps
-Make sure the device has no partitions mounted (last column):
+Make sure the disk has no partitions mounted (last column):
lsblk --paths
-Format selected device
-(replacing PATH_TO_YOUR_DEVICE with your actual device path):
+Format the connected but unused disk
+(replacing PATH_TO_YOUR_DISK with actual path):
- luksformat -t ext4 PATH_TO_YOUR_DEVICE
+ luksformat -t ext4 PATH_TO_YOUR_DISK
-Add info about the encrypted device to the file `etc/crypttab`:
+Add info about the encrypted disk to the file `etc/crypttab`:
- echo "mysecrets UUID=$(lsblk --noheadings -o UUID PATH_TO_YOUR_DEVICE) none luks,noauto" >> /etc/crypttab
+ echo "mysecrets UUID=$(lsblk --noheadings -o UUID PATH_TO_YOUR_DISK) none luks,noauto" >> /etc/crypttab
-Create mountpoint for the partition inside the encrypted device:
+Create mountpoint for the partition inside the encrypted disk:
mkdir /mnt/mysecrets
-Add info about the partition inside the encrypted device to the file `/etc/fstab`:
+Add info about the partition inside the encrypted disk to the file `/etc/fstab`:
echo "UUID=$(lsblk --noheadings -o UUID /dev/mapper/mysecrets) /mnt/mysecrets ext4 noauto" >> /etc/fstab