My laptop isn’t under my supervision most of the time. And I’d hate it if someone were to steal my SSD, or whole laptop even, when I’m not around. Is there a way to encrypt everything, but still keep the device in sleep, and unclock it without much delay. It’s a very slow laptop. So decryption on login isn’t viable, takes too long. While booting up also takes forever, so it needs to be in a “safe” state when simply logged out. Maybe a way that’s decrypt-on-demand?

I’m on Arch with KDE.

  • UnRelatedBurner@sh.itjust.worksOP
    link
    fedilink
    arrow-up
    1
    ·
    16 days ago

    I bought it used, so I’m interested in your last point. I’ve reinstalled it - first thing I did. Do SSDs slow down overtime? And there is a linux command to fix that? Sound crazy, can you elaborate?

    • bloodfart@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      16 days ago

      Yeah badblocks -n /dev/your_target_device launched from a different boot device.

      You can’t run it from your install because it’s gonna read every block into memory and then write some crap to it and read it back to make sure the block works then write what was originally there back to it.

      It’s really important that you check yourself before you wreck yourself with the badblocks command because you can destroy data if you use the wrong flags.

      Another program that fixes that problem is spinrite. It costs money but it’s very useful and has a lot of good documentation.

      Each cell in the ssd isn’t a digital “1” or “0” but a charge coupled device that stores a voltage. Over time that potential changes in a way that’s directly proportional to the number of read cycles and age of the data from first write. When it changes enough, the controller has to try to read it many times to get a sane result it can send down the bus.

      That results in your ssd seeming slow.

      How long does it take to boot though, and what do you expect?