Thanks for answering win32sux. Do you know how strong this encryption is, i mean who could break this kind of encryption when the disk has been overwritten with random data, would hackers be able to break it ? I recently saw an article where some security specialists had cracked several encryption tools (like dm-crypt and many others, like for example truecrypt) were the weakness was that the data was stored in RAM too long and they could read it from there when the computer was turned off or something.. they cooled down the RAM chips so the information wouldnt disappear in RAM as fast as it used to, or something like that.. does that mean that the encryption is now easy to break ? (ref. this article: http://www.eff.org/press/archives/2008/02/21-0
Im also wondering how strong the encryption is when using the badblocks program or the shred/wipe command to generate random data on a partition compared to using /dev/random or /dev/urandom. How big of a difference is it ? What about when no random data has been written to the partition(s) before adding encryption with cryptsetup for example, how strong or weak would it be compared to when you are writing random data on the partitions, would it be easy to break ?