<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<div class="moz-cite-prefix">On 3/27/23 10:23, Dave Horsfall wrote:<br>
</div>
<blockquote type="cite"
cite="mid:alpine.BSF.2.21.9999.2303280413500.86309@aneurin.horsfall.org">
<pre class="moz-quote-pre" wrap="">I've never used disk encryption before, so I have some concerns.</pre>
</blockquote>
<p>I've done "full disk encryption"* on laptop SSDs for many years,
using Linux encryption, as setup by Debian, not using any
encryption feature of the drive itself. In my most recent instance
I put some effort into moving tmp directories into RAM disks, but
I still have swap on SSD, and do I run modern web browsers, so I'm
almost always into swap at least.<br>
</p>
<p>I have had no problems.</p>
<p>I am good about doing backups onto (encrypted!) ping-ponged
external USB disks, on spinning media. So the Gods will be nice to
me. And I think two of the WD disks have died in the time I have
had my current computer, over two-and-a-half years. So the Gods
are not happy with WD.<br>
</p>
<blockquote>
<p>* "Full disk encryption" of course can't include the boot
volume. On my current computer, a Dell XPS-13, I was very
disappointed that booting from the micro SD slot is very iffy. I
*had* hoped to do battle with "evil maid" attacks by guarding a
tiny micro SD boot volume more closely than I can guard the
laptop itself. Alas, that didn't work.<br>
</p>
</blockquote>
<p>I suggest you go with disk encryption. And do backups, because
backups are always good.</p>
<p><br>
</p>
<p>-kb<br>
</p>
</body>
</html>