On 2 April 2016 at 20:31, Kai Krakow <hurikha...@gmail.com> wrote: > Am Sat, 2 Apr 2016 11:44:32 +0200 > schrieb Marc Haber <mh+linux-bt...@zugschlus.de>: > >> On Sat, Apr 02, 2016 at 11:03:53AM +0200, Kai Krakow wrote: >> > Am Fri, 1 Apr 2016 07:57:25 +0200 >> > schrieb Marc Haber <mh+linux-bt...@zugschlus.de>: >> > > On Thu, Mar 31, 2016 at 11:16:30PM +0200, Kai Krakow wrote: >> [...] >> [...] >> [...] >> > > >> > > I cryptsetup luksFormat'ted the partition before I mkfs.btrfs'ed >> > > it. That should do a much better job than wipefsing it, shouldnt >> > > it? >> > >> > Not sure how luksFormat works. If it encrypts what is already on the >> > device, it would also encrypt orphan superblocks. >> >> It overwrites the LUKS metadata including the symmetric key that was >> used to encrypt the existing data. Short of Shor's Algorithm and >> Quantum Computers, after that operation it is no longer possible to >> even guess what was on the disk before. > > If it was encrypted before... ;-)
What does wipefs -n find? -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html