<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="http://dev1galaxy.org/extern.php?action=feed&amp;tid=3601&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Nonpersistent and encrypted image]]></title>
		<link>http://dev1galaxy.org/viewtopic.php?id=3601</link>
		<description><![CDATA[The most recent posts in Nonpersistent and encrypted image.]]></description>
		<lastBuildDate>Sat, 13 Jun 2020 17:17:00 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Nonpersistent and encrypted image]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=22632#p22632</link>
			<description><![CDATA[<p>Ive always been meaning to play around with veracrypt volumes as mentioned in below info, i wonder if one could create a method to have squashfs could utilize veracrypt in some way?</p><p><a href="https://www.veracrypt.fr/en/VeraCrypt%20Hidden%20Operating%20System.html" rel="nofollow">https://www.veracrypt.fr/en/VeraCrypt%2 … ystem.html</a></p>]]></description>
			<author><![CDATA[dummy@example.com (HevyDevy)]]></author>
			<pubDate>Sat, 13 Jun 2020 17:17:00 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=22632#p22632</guid>
		</item>
		<item>
			<title><![CDATA[Re: Nonpersistent and encrypted image]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=22631#p22631</link>
			<description><![CDATA[<p>Haven&#039;t done it, but I have some thoughts. I normally do an encrypted persistent volume for live-usb systems. The squashfs is not encrypted, but it is read-only, so it&#039;s pretty safe. </p><p>It might be possible to encrypt the partition that holds the squashfs and use grub as the bootloader. You&#039;d have to edit the grub.cfg to add the same stuff that gets added when you do full-disk encryption. Set the usb up like a multi-boot live usb, except make the first partition a luks-encrypted volume with ext4 filesystem.</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Sat, 13 Jun 2020 16:53:32 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=22631#p22631</guid>
		</item>
		<item>
			<title><![CDATA[Nonpersistent and encrypted image]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=22625#p22625</link>
			<description><![CDATA[<p>I&#039;m wondering if the Linux desktop can be set up to mimick platforms like Android, in terms of their security model (and not their spyware).</p><p>Tools like dd can already &quot;flash&quot; a live image to a drive, like sda. This allows one to use a nonpersistent environment, which has its own cases and uses.</p><p>My thought was, if the squashfs could be encrypted, and isolinux could decrypt it at boot, then one could have a secure nonpersistent environment. There&#039;s a rather old ubuntu article about this, but the script is pretty convoluted, and it uses grub as opposed to isolinux. (<a href="https://askubuntu.com/questions/1041916/booting-encrypted-squashfs-from-live-cd" rel="nofollow">https://askubuntu.com/questions/1041916 … om-live-cd</a>)</p><p>So, I wanted to know if anyone has accomplished this kind of thing, and if so, how?</p>]]></description>
			<author><![CDATA[dummy@example.com (siva)]]></author>
			<pubDate>Sat, 13 Jun 2020 15:33:46 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=22625#p22625</guid>
		</item>
	</channel>
</rss>
