95
submitted 1 year ago by mambabasa@slrpnk.net to c/linux@lemmy.ml

Heya folks, some people online told me I was doing partitions wrong, but I’ve been doing it this way for years. Since I’ve been doing it for years, I could be doing it in an outdated way, so I thought I should ask.

I have separate partitions for EFI, /, swap, and /home. Am I doing it wrong? Here’s how my partition table looks like:

  • FAT32: EFI
  • BTRFS: /
  • Swap: Swap
  • Ext4: /home

I set it up this way so that if I need to reinstall Linux, I can just overwrite / while preserving /home and just keep working after a new install with very few hiccups. Someone told me there’s no reason to use multiple partitions, but several times I have needed to reinstall the OS (Linux Mint) while preserving /home so this advice makes zero sense for me. But maybe it was just explained to me wrong and I really am doing it in an outdated way. I’d like to read what you say about this though.

you are viewing a single comment's thread
view the rest of the comments
[-] chunkyhairball@lemmy.ml 8 points 1 year ago

You’re using it well. Nothing wrong at all.

This. Too many partitions for a home system can get pretty stupid pretty quick. But OP has just the right amount of separation between system and data. I've known people that were uncomfortable without breaking /var (or /var/log) off into its own partition, but that's really overkill for a stable, personal system, IMO.

computer isn’t a dino that can’t handle it.

I feel personally called out by this statement!

Seriously, the big one for me, is that I like having drive encryption. It protects my computer and data should it fall into the hands of, say, burglers. I also like turning it up to the elevens simply because I'm a bit TOO paranoid. You really need more than 1GB of ram to do argon2id key derivation, which is what fde is all moving to for unlocking purposes, and BIOS just can't do that. My main workstation is using a powerful, but older mobo with gigabyte's old, horrid faux EFI support.

Another good one for the security-conscientious person is Secure Boot, meaning that you control what kernels and bootloading code is allowed to boot on your computer, preventing Evil Maid-type attacks: https://wiki.ubuntu.com/UEFI/SecureBoot

That's pretty far fetched, but maybe not too out of the question if you, say, work for a bank or accountant.

Of course none of that matters if you don't practice good operational security.

this post was submitted on 13 Nov 2023
95 points (100.0% liked)

Linux

48159 readers
617 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS