For me that’s under Internet > Saved Networks > network name > Share, instead of doing it from the main list of networks
- 0 Posts
- 3 Comments
Max@lemmy.worldto Selfhosted@lemmy.world•Encrypted boot drive and unattended rebootsEnglish3·1 month agoBy default, an enencrypted boot drive is not sufficient to be able to decrypt a LUKs drive. If you have to type in your password to start the computer/unlock LUKs then you should be good.
If you’ve setup a keyfile or TPM based decryption of LUKS, then your data is probably not safe (though a TPM based decryption could be if the OS is secure and secure boot is setup properly)
In this case, if you have another server then you could setup a mutual tang/clevis system where each device gets the keys it needs from the other server on the LAN. Both would be LUKs encrypted. So if one is online the other gets the required key from the online one while booting. But if both are offline then no keys are available and you have to type in a LUKS password to boot. Something like https://www.ogselfhosting.com/index.php/2023/12/25/tang-clevis-for-a-luks-encrypted-debian-server/ but what they do with multiple servers is probably overkill
I believe for the highest efficiency you only want to use about half of the rated power of the PSU. So if your system draws 350W, 700 is a very reasonable power supply