I think the answer there is fscrypt - native encryption at the
filesystem level supported by ext4 and some other day - but I'm not sure
what the plans are. Partitioning is hard and the requirement to setup a
separate /boot and crypt device are not always possible, though it is
less of an issue these days with GPT devices.

As I pointed out on another bug report, the goal to dual boot with
encryption is not helped much by new devices being sold with BitLocker
enabled for the drive, forcing you to disable it in order to install
Ubuntu in the first place (one reason I imagine being that the
encryption key is sealed to the Windows boot process in the TPM, so
there's not a way to decrypt it from another OS, or even Windows booted
from a different disk).

That the installer is unable to unlock luks partitions is a bit
unfortunate as it forces users to do more steps manually, and makes
reinstalling Ubuntu harder on systems where you want to keep /home but
replace /; or running multiple distributions in parallel - I've been hit
by that as well.

In any case, I understand and share the concerns raised here and will
try to raise that internally, as this might also simply have went out of
our radar.

** Tags added: rls-hh-incoming

** Changed in: ubiquity (Ubuntu)
       Status: Confirmed => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1799550

Title:
  No way to encrypt at partition level (dual boot)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1799550/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to