{"id":2432,"date":"2024-01-13T22:18:43","date_gmt":"2024-01-13T16:48:43","guid":{"rendered":"https:\/\/www.veeble.org\/kb\/?p=2432"},"modified":"2025-04-15T12:19:58","modified_gmt":"2025-04-15T06:49:58","slug":"encrypt-disk-ubuntu-cli","status":"publish","type":"post","link":"https:\/\/www.veeble.com\/kb\/encrypt-disk-ubuntu-cli\/","title":{"rendered":"How to Encrypt Disk in Ubuntu via CLI"},"content":{"rendered":"\n<p>Learn how to boost your data security by encrypting your disk in Ubuntu using the Command Line Interface (CLI). This guide is designed for users of all technical levels, especially those who are new to disk encryption.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/08\/Disk-Encryption.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"525\" data-id=\"4939\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/08\/Disk-Encryption.jpg\" alt=\"How to Encrypt Disk in Ubuntu via CLI\" class=\"wp-image-4939\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/08\/Disk-Encryption.jpg 1920w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/08\/Disk-Encryption-300x82.jpg 300w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/08\/Disk-Encryption-1024x280.jpg 1024w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/08\/Disk-Encryption-768x210.jpg 768w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/08\/Disk-Encryption-1536x420.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"preparing-ubuntu-for-encryption\">Preparing Ubuntu for Encryption<\/h4>\n\n\n<pre class=\"wp-block-verse has-ast-global-color-5-color has-black-background-color has-text-color has-background has-link-color has-small-font-size wp-elements-9027b6ea895186cf22142414b48081e8\"><em><strong>General Precaution:<\/strong> It's important to make a complete backup of your data before encrypting it. Eventhough you'll need to format the disk during encryption, erasing all existing data. There's also a risk of mistakenly encrypting the wrong disk or partition, potentially making important data inaccessible, especially if the encryption password is forgotten.<\/em><\/pre>\n\n\n\n<p><strong>Verify the Disk Space:<\/strong> Make sure your disk has adequate room for encryption. As it organizes and protects your data, the procedure can require more space. To check disk space, use the below command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>df -h<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-171742.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"554\" height=\"163\" data-id=\"2444\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-171742.png\" alt=\"Checking Disk space on a linux system\" class=\"wp-image-2444\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-171742.png 554w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-171742-300x88.png 300w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"install-the-utility-for-encryption\">Install the Utility for Encryption<\/h4>\n\n\n<p>The main encryption method we&#8217;re using is <strong>LUKS (Linux Unified Key Setup)<\/strong> and the software tool we use to set up encryption with LUKS is <strong>cryptsetup<\/strong>. <br>Check out more on this encryption from the link: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Linux_Unified_Key_Setup\" target=\"_blank\" rel=\"noopener\">https:\/\/en.wikipedia.org\/wiki\/Linux_Unified_Key_Setup<\/a><\/p>\n\n\n\n<p>To install the tool cryptsetup, open the Terminal and type:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt-get install cryptsetup<\/code><\/pre>\n\n\n\n<p>This installs the necessary tools for encryption. You&#8217;re now ready to move on to the next step!<\/p>\n\n\n\n<p><\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"identify-your-disk\">Identify your Disk<\/h4>\n\n\n<p>Type <code>sudo fdisk -l<\/code> in Terminal to see all your disks. Pick the one you want to encrypt:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo fdisk -l<\/code><\/pre>\n\n\n\n<p class=\"has-ast-global-color-5-color has-black-background-color has-text-color has-background has-link-color has-small-font-size wp-elements-492692958806039161ec00a54dbe54b7\"><em>In this guide, we&#8217;ll use <code>\/dev\/vda3<\/code> as the example disk partition for encryption. However, when you follow these steps, remember to replace <code>\/dev\/vda3<\/code> with the name of the disk partition you want to encrypt.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-175304.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"879\" height=\"284\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-175304.png\" alt=\"fdisk -l\" class=\"wp-image-2445\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-175304.png 879w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-175304-300x97.png 300w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-175304-768x248.png 768w\" sizes=\"auto, (max-width: 879px) 100vw, 879px\" \/><\/a><\/figure>\n\n\n\n<p>Disk identification has been completed. We are now unmounting that disk partition and proceeding to the encryption phase with the command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>umount \/dev\/vda3<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"encrypt-with-luks\">Encrypt with LUKS<\/h4>\n\n\n<p><strong>Initialize Encryption:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo cryptsetup luksFormat \/dev\/vda3<\/code><\/pre>\n\n\n\n<p class=\"has-ast-global-color-5-color has-black-background-color has-text-color has-background has-link-color has-small-font-size wp-elements-7ea2bb3b169ae93909de5b74a09f4812\"><em>Replace <code>\/dev\/vda3<\/code> with the actual partition, you want to encrypt.<\/em><\/p>\n\n\n\n<p>This command initializes the encryption process. You will receive a warning that this action will erase all data on the partition. Confirm by typing <code>YES<\/code> in capital letters. After confirmation, you&#8217;ll be prompted to enter a passphrase. Choose a strong, memorable passphrase, as this will be required to unlock the encrypted data.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Open Encrypted Disk:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cryptsetup open \/dev\/vda3 my_secret_data<\/code><\/pre>\n\n\n\n<p class=\"has-ast-global-color-5-color has-black-background-color has-text-color has-background has-link-color has-small-font-size wp-elements-ca30a6bfbab597269219133c9e23d1b5\"><em>Again, replace <code>\/dev\/vda3<\/code> with your partition. <code>my_secret_data<\/code> is an arbitrary name you give to the encrypted device mapper. This name can be anything, but it will be used to identify the encrypted volume in <code>\/dev\/mapper\/<\/code>.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/encryption.gif\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"738\" height=\"256\" data-id=\"2446\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/encryption.gif\" alt=\"Encryption with LUKS\" class=\"wp-image-2446\"\/><\/a><\/figure>\n<\/figure>\n\n\n\n<p> After this step, the encrypted partition is accessible via a new device-mapper entry located at <code>\/dev\/mapper\/<code>my_secret_data<\/code><\/code>.<\/p>\n\n\n\n<p><\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"create-a-filesystem-for-the-encrypted-disk\">Create a Filesystem for the Encrypted Disk <\/h4>\n\n\n<p><strong>Format the Disk:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo mkfs.ext4 \/dev\/mapper\/my_secret_data<\/code><\/pre>\n\n\n\n<p>This command formats the newly created mapped device with an ext4 filesystem. Remember that <code>\/dev\/mapper\/my_secret_data<\/code> is the name you assigned in the previous step.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-190850.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"639\" height=\"225\" data-id=\"2448\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-190850.png\" alt=\"Formatting file system with ext4\" class=\"wp-image-2448\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-190850.png 639w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-190850-300x106.png 300w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Mount the Disk<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo mount \/dev\/mapper\/my_secret_data \/mnt<\/code><\/pre>\n\n\n\n<p>Here, you&#8217;re mounting the encrypted volume to a directory (in this case, <code>\/mnt<\/code>). This directory is where you&#8217;ll access the files stored in the encrypted partition. Ensure that <code>\/mnt<\/code> is not already in use or choose a different mount point.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Automounting the Disk:<\/strong><\/p>\n\n\n\n<p>To mount encrypted volumes automatically at boot in a Linux system, you typically need to make entries in both <code>\/etc\/fstab<\/code> and <code>\/etc\/crypttab<\/code>. If this is not done, the file system will be unmounted when the system reboots. To automatically mount at boot, first you need to identify the UUID of the disks. This can be a bit complex, as it involves identifying the UUID of your encrypted volume and properly configuring the mount options.<br><br>To identify the UUID of disks, execute the following command in the terminal:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo blkid<\/code><\/pre>\n\n\n\n<p>This will list all the block devices along with their UUIDs and other information.  Look for the entry corresponding to <code>\/dev\/mapper\/my_secret_data<\/code>. It should look something like this:<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-5 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-200313.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1212\" height=\"105\" data-id=\"2449\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-200313.png\" alt=\"\" class=\"wp-image-2449\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-200313.png 1212w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-200313-300x26.png 300w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-200313-1024x89.png 1024w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-200313-768x67.png 768w\" sizes=\"auto, (max-width: 1212px) 100vw, 1212px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p>The UUID will be the string inside the quotes after <code>UUID=<\/code>. You can then use this UUID of <code>\/dev\/vda3<\/code> in your <code>\/etc\/crypttab<\/code> and UUID of <code>\/dev\/mapper\/my_secret_data<\/code> in <code>\/etc\/fstab<\/code>.<\/p>\n\n\n\n<p>To edit those files you can use editors such as <a href=\"https:\/\/www.veeble.org\/kb\/vi-editor\/\" target=\"_blank\" rel=\"noopener\">VI<\/a> or <a href=\"https:\/\/www.nano-editor.org\/dist\/v2.2\/nano.html\" target=\"_blank\" rel=\"noopener\">Nano<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>An example entry for <code>\/etc\/crypttab<\/code> using your UUID:<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-6 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214559.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"183\" data-id=\"2453\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214559.png\" alt=\"entry for \/etc\/crypttab\" class=\"wp-image-2453\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214559.png 805w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214559-300x68.png 300w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214559-768x175.png 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p>This tells the system to ask for a passphrase on boot to unlock the partition with UUID <code>a74b33ea-ea47-4da2-8e61-3623fe7a94b6<\/code>, and make it available as <code>\/dev\/mapper\/my_secret_data<\/code>. Replace the entries such as UUID and arbitary name of encrypted device (<code>my_secret_data<\/code>) with your actual values in your files.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>An example entry for <code>\/etc\/fstab<\/code> using your UUID:<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-7 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214742.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"269\" data-id=\"2454\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214742.png\" alt=\"Adding UUID in \/etc\/fstab\" class=\"wp-image-2454\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214742.png 801w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214742-300x101.png 300w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-13-214742-768x258.png 768w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p>This mounts the decrypted filesystem (with UUID <code>9731af3e-848d-4811-87cd-5405b7ab6fd9<\/code> from <code>\/dev\/mapper\/my_secret_data<\/code>) to <code>\/mnt<\/code> (replace <code>\/mnt<\/code> and UUID with your actual desired mount point and UUID).<\/p>\n\n\n\n<p>By setting up both files correctly, during the booting process of your system, the system will prompt the passphrase to unlock the encrypted partition as per the <code>\/etc\/crypttab<\/code> configuration. Once unlocked, the system will then automatically mount the filesystem according to the <code>\/etc\/fstab<\/code> configuration and ensure that your encrypted data is readily accessible.<\/p>\n\n\n\n<p class=\"has-ast-global-color-5-color has-black-background-color has-text-color has-background has-link-color has-small-font-size wp-elements-f0c58aef73942804ec2fd6625ac55f6b\"><em>Editing <code>\/etc\/fstab<\/code> and <code>\/etc\/crypttab<\/code> requires care, as incorrect entries can cause boot problems. It&#8217;s recommended to have a good understanding of these files or seek guidance if you&#8217;re unsure.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\">Congratulations! We have successfully encrypted the disk. \ud83e\udd73<\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-call-to-action uagb-block-fea1b0b1 wp-block-button\"><div class=\"uagb-cta__wrap\"><h3 class=\"uagb-cta__title\">Get started with your own VPS today!<\/h3><p class=\"uagb-cta__desc\">Our VPS hosting plans are perfect for businesses and individuals who need a powerful and reliable server to host their website or application.<\/p><\/div><div class=\"uagb-cta__buttons\"><a href=\"https:\/\/www.veeble.com\/in\/kvm-vps\/\" class=\"uagb-cta__button-link-wrapper wp-block-button__link\" target=\"_blank\" rel=\"noopener noreferrer\">Order now<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to boost your data security by encrypting your disk in Ubuntu using the Command Line Interface (CLI). This guide is designed for [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":8591,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[9,5],"tags":[],"class_list":["post-2432","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-firewallsecurity","category-linux"],"uagb_featured_image_src":{"full":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/How-to-Encrypt-Disk-in-Ubuntu-via-CLI.jpg",1536,1024,false],"thumbnail":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/How-to-Encrypt-Disk-in-Ubuntu-via-CLI-150x150.jpg",150,150,true],"medium":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/How-to-Encrypt-Disk-in-Ubuntu-via-CLI-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/How-to-Encrypt-Disk-in-Ubuntu-via-CLI-768x512.jpg",768,512,true],"large":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/How-to-Encrypt-Disk-in-Ubuntu-via-CLI-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/How-to-Encrypt-Disk-in-Ubuntu-via-CLI.jpg",1536,1024,false],"2048x2048":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2024\/01\/How-to-Encrypt-Disk-in-Ubuntu-via-CLI.jpg",1536,1024,false]},"uagb_author_info":{"display_name":"Adrian Antony","author_link":"https:\/\/www.veeble.com\/kb\/author\/adrian\/"},"uagb_comment_info":0,"uagb_excerpt":"Learn how to boost your data security by encrypting your disk in Ubuntu using the Command Line Interface (CLI). This guide is designed for [&hellip;]","_links":{"self":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/2432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/comments?post=2432"}],"version-history":[{"count":10,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/2432\/revisions"}],"predecessor-version":[{"id":7367,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/2432\/revisions\/7367"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/media\/8591"}],"wp:attachment":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/media?parent=2432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/categories?post=2432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/tags?post=2432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}