1) if an attacker has got some files which are on an (AES) encrypted device, will he be able to decrypt the whole device? 2) is it a good idea to run "cat /dev/zero > zero.file; shred -uv zero.file" on (AES) encrypted devices to overwrite all free space with random data [to remove any encrypted data which is left from deleted files from the device behind the loopback device and confuse attackers]? the brackets in "(AES)" mean that i'd like to know if the answer applies to AES only or also other cyphers (i guess so?) Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/