Template: cryptsetup-nuke-password/password Type: password _Description: Nuke password: If you setup a “nuke password”, you will be able to type this password at the early-boot prompt asking your passphrase to unlock your luks-encrypted partitions. Instead of decrypting the partitions, typing this password will instead wipe the encryption keys from the luks container so that it is no longer possible to unlock the encrypted partitions. . This provides a relatively stealth way to make your data unreadable in case you fear that your computer is going to be seized. . If you want to cancel this operation or disable any nuke password already configured, simply enter an empty password. If needed, you will be given the option to pick between both choices. Template: cryptsetup-nuke-password/password-again Type: password _Description: Re-enter password to verify: Please enter the same nuke password again to verify that you have typed it correctly. Template: cryptsetup-nuke-password/password-mismatch Type: error _Description: Password input error The two passwords you entered were not the same. Please try again. Template: cryptsetup-nuke-password/already-configured Type: select Default: overwrite Choices-C: keep, overwrite, remove __Choices: Keep the current password, Overwrite the current password, Remove the current password _Description: A nuke password is already configured, what should be done? The existence of /etc/cryptsetup-nuke-password/password_hash suggests that a nuke password is already configured. If you decide to keep the current nuke password, nothing will be done. If you decide to overwrite the current nuke password, you will be asked for a new password and it will replace the currently configured one. If you decide to remove the nuke password, you will not be asked for a new password and the currently configured password will be disabled.