Source: cryptsetup-nuke-password Section: admin Priority: optional Maintainer: Progress Linux Maintainers XSBC-Uploaders: Daniel Baumann XSBC-Original-Maintainer: Debian Security Tools XSBC-Original-Uploaders: Raphaël Hertzog , Jonas Meurer Bugs: mailto:maintainers@lists.progress-linux.org Build-Depends: debhelper-compat (= 13), shunit2, po-debconf Standards-Version: 4.6.2 Homepage: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password Vcs-Browser: https://git.progress-linux.org/packages/graograman-backports/cryptsetup-nuke-password Vcs-Git: https://git.progress-linux.org/packages/graograman-backports/cryptsetup-nuke-password XSBC-Original-Vcs-Browser: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password XSBC-Original-Vcs-Git: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password.git Package: cryptsetup-nuke-password Architecture: any Depends: cryptsetup (>= 2:2.7.0-1+exp2~), ${shlibs:Depends}, ${misc:Depends} Enhances: cryptsetup-initramfs Description: Erase the LUKS keys with a special password on the unlock prompt Installing this package lets you configure a special "nuke password" that can be used to destroy the encryption keys required to unlock the encrypted partitions. This password can be entered in the usual early-boot prompt asking the passphrase to unlock the encrypted partition(s). . This provides a relatively stealth way to make your data unreadable in case you fear that your computer is going to be seized. . After installation, use “dpkg-reconfigure cryptsetup-nuke-password” to configure your nuke password.