blob: 389a45467463340402b16b5dd95268912414394b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
|
Source: cryptsetup-nuke-password
Section: admin
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Raphaël Hertzog <raphael@offensive-security.com>, Jonas Meurer <jonas@freesources.org>
Build-Depends: debhelper-compat (= 13), shunit2, po-debconf
Standards-Version: 4.6.2
Homepage: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password
Vcs-Browser: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password
Vcs-Git: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password.git
Package: cryptsetup-nuke-password
Architecture: any
Depends: cryptsetup-bin, ${shlibs:Depends}, ${misc:Depends}
Enhances: cryptsetup-initramfs
Description: Erase the LUKS keys with a special password on the unlock prompt
Installing this package lets you configure a special "nuke password" that
can be used to destroy the encryption keys required to unlock the encrypted
partitions. This password can be entered in the usual early-boot prompt
asking the passphrase to unlock the encrypted partition(s).
.
This provides a relatively stealth way to make your data unreadable in
case you fear that your computer is going to be seized.
.
After installation, use “dpkg-reconfigure cryptsetup-nuke-password” to
configure your nuke password.
|