https://bugzilla.kernel.org/show_bug.cgi?id=92271 --- Comment #18 from Alexander Holler <holler@xxxxxxxxxxxxx> --- And if the encrypted content isn't really deleted, what happens if the key has gone away before it was "flushed" (whatever that means)? Which doesn't sound that unlikely after we've learned about the resources governments are using to get their hands on such stuff. So one could say one problem was exchanged against another, if the storage isn't really erased (which leads to original problem). Anyway, maybe the easy way I've used to fix fat in a few hours works for extN too. No idea if and when I will try or even post patches, as I personally don't have any problem with all that and are happily able to secure my own stuff according to most of my needs (hopefully). So I'll now stop arguing (likely to your pleasure) ;) -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html