Marc Schwartz schrieb: > It's a full day process (including the random writing of data) why not setting up the encrypted device&filesystem and filling it with random data afterwars? you could copy your files to the device and fill the rest with files dumped from /dev/urandom (each 100mb) so you can work (except from the cpu and disk load from the dumping process) and have the zeros wiped from you unencrypted device? so, is there any security reason why not filling the partition with random data afterwars? thanks Jan --------------------------------------------------------------------- - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx