• 0 Posts
  • 3 Comments
Joined 3 months ago
cake
Cake day: July 6th, 2024

help-circle
  • Ooops@feddit.orgtoScience Memes@mander.xyzAlpha
    link
    fedilink
    English
    arrow-up
    35
    ·
    edit-2
    4 days ago

    Actual wolf packs are a family. One pair of adults plus their children. Until those are old enough, then they leave and search for a partner and own territory.

    All the stuff you read about pack alphas, all the sociological pseudo-science about alpha behavior derived from it… that’s all based on a one bullshit study about a large group of wolves artificially intoduced to a new area, that in no way behaved like wolves naturally do.

    Basically the equivalent of putting a few dozen teen-age boys on an isolated island then studying their behavior to understand human society.



  • This would -at least as far as I understand it- limit your swap’s functionality for hibernation etc. Because there your swap needs to be available early. You can still do it in theory, but the key file then would need to be included in you initrams, which kind of defeats the purpose.

    There is however a much more easier option: either use LVM on luks (so the volume is decrypted with the password and then contains both, root and swap) or just use the same password for root and swap while switching over to the systemd hooks (as those encryption hooks try unlokcing everything with the first provided password by default, and only ask for additional password if this fails).

    EDIT: Seeing that you crossposted this from an archlinux-specific community: You can find the guide here. It’s for using a fully enrcypted system with grub as bootloader, but the details (in 8.3 and 8.4) are true for all boot methods. Replace the busybox hooks with their systemd equivalents (in minitcpio.conf for archlinux but again this isn’t limited to that init system), then add “rd.luks.name=<your swap’s uuid=swap” to your kernel parameters and also replace the “cryptdevice=UUID=<your root’s uuid>:root” that should already be there for an encrypted system (that’s the syntax for the busybox hook) with “rd.luks.name=<your root’s uuid>=root”. On startup you will be asked for your password as usual, but then both root and swap will be decrypted with it (PS: the sd-encrypt hook only tries this once… so if you screw up and misstype your password on the first try, you will then have to type it again two times, once for root, once for swap…)