====== encrypted ====== Consider fill with random data [[https://niziak.spox.org/wiki/linux:fs:luks#fill_with_random_data]] cryptsetup luksFormat --cipher aes-xts-plain64 --key-size 512 --hash sha512 --sector-size 4096 --verify-passphrase --use-random /dev/nvme0n1p4 blkid /dev/nvme0n1p4 Consider [[https://wiki.niziak.spox.org/linux:backup:luks|luks header backup]] home2 UUID=aad5d877-2bc5-460b-8441-32b89c0462e6 none luks,noearly,noauto,loud,discard cryptdisk_start home2 dmsetup table mkfs.btrfs /dev/mapper/home2 mkdir /home2 mount /dev/mapper/home2 /home2 cd home2 btrfs sub create @home cd .. umount /home2 cryptdisks_stop home2 /dev/mapper/home2 /home2 btrfs noauto,noatime,nodiratime,relatime,subvol=@home 0 0 systemctl daemon-reload cryptdisks_start home2 mount /home2 ... umount /home2 cryptdisks_stop home2 update-initramfs -u -k all