always, use caution when formatting any disk. You could lose valuable information if you format
the wrong disk or partition.
#
mkfs.ext4 -L persistence /dev/sdb3
mke2fs 1.45.6 (20-Mar-2020)
Creating filesystem with 3049472 4k blocks and 762528 inodes
Filesystem UUID: cedc7589-a002-4aae-8963-f5197d6d9d4a
Superblock backups stored on blocks:
32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632, 2654208
Allocating group tables: done
Writing inode tables: done
Creating journal (16384 blocks): done
Writing superblocks and filesystem accounting information: done
#
mount /dev/sdb3 /mnt
#
echo ”/ union” >/mnt/persistence.conf
#
ls -l /mnt
total 20
drwx------ 2 root root 16384 May 10 13:31 lost+found
-rw-r--r-- 1 root root
8 May 10 13:34 persistence.conf
#
umount /mnt
The USB key is now ready and can be booted with the “Live USB Persistence” boot menu entry.
9.4.3. Setting Up Encrypted Persistence on a USB Key
live-boot
is also able to handle persistence file systems on encrypted partitions. You can thus
protect the data of your persistent directories by creating a LUKS encrypted partition holding the
persistence data.
The initial steps are the same up to the creation of the partition but instead of formatting it with
an ext4 file system, use
cryptsetup
to initialize it as a LUKS container. Then open that container
and setup the ext4 file system in the same way as in the non-encrypted setup, but instead of using
the
/dev/sdb3