There seems to be some people who are in trouble because they can look inside the used hard disk. If it is encrypted, it will not be logically peeked even if it is physically peeked.
Linux makes it very easy to encrypt a disk.
Encrypt using luks. Use
cryptsetup as the command.
# cryptsetup luksFormat <device_name>
The contents of the device will disappear, but you will be asked if it is okay. Respond to
YES in uppercase.
You will then be asked for your passphrase. Enter the same passphrase twice as usual.
This is the step to gain access to encrypted devices.
# cryptsetup open <device_name> <mapped_name>
You will be asked for your passphrase.
It maps to
/ dev / mapper / <mapped_name>.
Use the block device
/ dev / mapper / <mapped_name> as you like.
mount. If anything, also
The opposite of open. If it is mounted, unmount it first.
# cryptsetup close <mapped_name>
If you're using unencrypted rootfs with a single partition, you can also use a file like swapfile. All you have to do is create an empty file with
dd if = / dev / zero and
I don't think SSD will reduce performance to the point of concern.