

3·
2 days agoTotally agree. I take it a step further and keep my /home on a separate encrypted M.2, and my /boot on an old 256GB SSD. That setup lets me fully encrypt root while keeping /boot accessible. I use grml-rescueboot to add ISOs to the GRUB menu and the extra space on /boot is handy.
It’s been a while, but I remember encrypting just the home folder used to break SSH key auth unless the user was already logged in locally, because their .ssh/authorized_keys file wasn’t available. Pre-shared keys make scp and tab completion really convenient, so that was kind of a pain.
My journey started with a Debian based distro called College Linux, got the CD in a magazine I think. I used Debian a bit after that, but was on Ubuntu for the systemd transition.
Did anyone live through the systems transition on Debian, how was it? Was it Jessie? I don’t think I successfully upgraded a single Ubuntu server VM without issue.