How to create an encrypted secondary storage to lock/encrypt individual qubes revisions

Go back to topic: How to create an encrypted secondary storage to lock/encrypt individual qubes

  1. v4 anchor; v4 full version
  2. v3 anchor; v3 full version
  3. v2 anchor; v2 full version

Revision #4

Edited on
2025-07-02
Edited by user
kcosmus
3. Adding an additional layer of encryption. 3. Adding an additional layer of encryption. > For example you use QubesOS as your main OS but you live with family (parents, partner, kids etc.) and want to lock some stuff away just to be safe… Or another example you travel a lot and work in trains, cafes, hotels etc. and even when you are careful maybe someone gets a look at your password or snatches your unlocked laptop. You should anyways protect your data with additional measures but why not keep part of the hard drive with whole qubes encrypted when you don’t need then at this moment?

Revision #3

Edited on
2025-07-01
Edited by user
kcosmus
This is a step-by-step guide based on [secondary-storage](/doc/secondary-storage/#example-hdd-setup) with added encryption. This is a step-by-step guide based on [secondary-storage](https://www.qubes-os.org/doc/secondary-storage/#example-hdd-setup) with added encryption.
sudo pvcreate /dev/mapper/storage2 sudo pvcreate /dev/mapper/storage2
sudo vgcreate vg_sec2 /dev/mapper/storage2 sudo vgcreate vg_sec2 /dev/mapper/storage2

Revision #2

Edited on
2025-07-01
Edited by user
kcosmus