I’m planning to set up LUKS on an SSD. Many guides are suggesting using a simple key to set things up and then revoke it when everything is in place.

Given the wear leveling behavior on SSDs I am assuming a simple key might be able to unlock even beyond the revocation if a determined attacker has the disk. I don’t want someone to be able to put the disk in factory access mode and be able to brute force attempt their way to browser cookies and email accounts.

I’m going to ignore the suggestion about using a weak key to set up, but am I being overly paranoid? Am I being not paranoid enough and I should also not rely on revocation for a spinning rust disk?

  • Gooey0210
    link
    fedilink
    English
    arrow-up
    2
    ·
    10 months ago

    The op probably meant removing one key and adding another

    • jkrtn@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      10 months ago

      Yes. Some guides suggest, say, “just use ‘key’ for now, we’ll replace it later.” I didn’t mention their step adding a stronger key, I guess I didn’t see that as an important part of the question.

      • solrize@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        10 months ago

        I’ve never done it that way and don’t see the benefit. Am I missing something? Of course for a testing setup just do something easy. But don’t store any sensitive data under a weak key, ever.