Commit 506e2aa6 authored by's avatar Committed by IkiWiki
Browse files

This reverts commit 95513205

parent d00f40c7
......@@ -106,13 +106,10 @@ Implementation note:
- It might be possible to reuse the same LUKS header to create the
backup Persistence without prompting for a passphrase.
At first glance:
* To create the backup Persistence,
<span class="command">cryptsetup luksHeaderBackup/luksHeaderRestore</span> should work.
* To unlock the backup Persistence,
<span class="command">sudo dmsetup table --showkeys TailsData_unlocked</span> should dump the master key from memory and
<span class="command">cryptsetup --master-key-file</span> should unlock with the master key.
At first glance, cryptsetup luksHeaderBackup/luksHeaderRestore should
work to create that backups LUKS volume; and then, to unlock it, one
could dump the master key from memory and pass it to cryptsetup open
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment