Setting up LUKS 2 – Keeping the Data Safe – Securing a System
We can now look at the LUKS key slots. You should see the key in the second slot now.As seen in the following screenshot, slot 1: is populated with a key: Figure 9.7 – LUKS with the second slot used…