My laptop isn’t under my supervision most of the time. And I’d hate it if someone were to steal my SSD, or whole laptop even, when I’m not around. Is there a way to encrypt everything, but still keep the device in sleep, and unclock it without much delay. It’s a very slow laptop. So decryption on login isn’t viable, takes too long. While booting up also takes forever, so it needs to be in a “safe” state when simply logged out. Maybe a way that’s decrypt-on-demand?

I’m on Arch with KDE.

  • BaalInvokerA
    link
    fedilink
    arrow-up
    4
    ·
    13 days ago

    Are the detectors part for real or were you just kidding? 😲

    You were probably trying to format it nice, but I’ve only read this phrasing from AI.

    Yes, I was, because I like to put my text well formated… I feel pain when I have to read bad formated texts, so I try to be as clean as possible

    But thanks for the answer, the home folder would probably be best. I don’t want to think about it after setting it up. All my downloads and docs are there. I also feel like the whole filesystem would take forever for me to unlock/boot.

    For home folder I think there is a better alternative, like systemd-homed or something like that

    • UnRelatedBurner@sh.itjust.worksOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      13 days ago

      Are the detectors part for real or were you just kidding? 😲

      they got your back, why are you suprised?

      Others also said systemd-homed. And it looks promising, I’ll try it, but honestly I have no idea how to test it? From another user? From a liveboot usb?

      • BaalInvokerA
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        13 days ago

        Because I don’t even knew that this kind of tool exists. And it was precise AF. I just got surprised/scared haha

        About systemd-homed, I guess that liveusb will not work… I suggest you to try in a VM and everything going ok, you may try on another user on your pc