Create a Pareto Cloud account
Encryption is on
Check if encryption is already enabled
First, check if your system already has disk encryption enabled:
Look for "crypto_LUKS" in the FSTYPE column. If present, your disk is already encrypted.
This shows details about active encrypted volumes.
How to enable disk encryption
Option 1: During Installation (Recommended)
The easiest way to enable encryption is during the initial OS installation:
- Ubuntu/Debian: Select "Encrypt the new Ubuntu installation" during partitioning
- Fedora: Check "Encrypt my data" in the Installation Destination screen
- Arch Linux: Set up LUKS manually during installation using
cryptsetup
- openSUSE: Enable "Encrypt System" in the partitioning step
Option 2: Encrypt Existing System (Advanced)
Warning
Encrypting an existing system is complex and risky. Always backup all important data before attempting this process. Consider reinstalling with encryption instead.
For existing systems, the process involves:
- Create a full backup of your system
- Boot from a live USB/CD
- Shrink existing partition to make space
- Set up LUKS encryption and migrate data
- Update bootloader configuration
Managing Encryption Keys
LUKS supports multiple keys for accessing encrypted volumes:
Add a backup key:
List key slots:
Remove a key:
Recovery and Backup
Create a backup of your LUKS header (critical for recovery):
Store this backup file in a safe location separate from your encrypted device.
Pro Tips
- Use a strong, memorable passphrase rather than a short password
- Consider setting up multiple key slots for different recovery scenarios
- Some distributions support TPM integration for automatic unlocking
- Test your recovery process in a virtual machine first
Important Notes
- Forgotten passphrases cannot be recovered without a backup key
- LUKS header corruption can make data inaccessible - keep backups
- Encryption adds minimal performance overhead on modern systems
- Swap partitions should also be encrypted to prevent key leakage