I made an encrypted USB install of Ubuntu on a 32GB USB pendrive using LUKS encryption on the swap and actual install. How do I make it so no hard drives are mounted at boot or even probed for that matter. On the offchance the system running the USB key has linux on it, it would mount an unencrypted Swap partition and I don't want this to happen. Any ideas?
EDIT: This is the dmesg output when I boot with the appropriate kernel parameters:
EDIT2:
I finally got the USB all setup by doing the following.
Created the LUKS volumes in terminal, away from ubiquity
Disabled swap in the HDD in ubiquity
Installed the system.
Now I have everything on my USB except grub is now giving me grief. I mount everything, I do and update-grub, then install grub to the USB with no errors. However, when I reboot into grub on the USB, the only boot entries there are my Hard drive installs, the system on my usb wont even show up on the grub menu. If i can just get it to show up, then I will be able to boot into my system and be at peace. How am I able to add a custom grub entry that supports booting from an encrypted volume? I have two requirements for an answer:
Explain how to move initrd and vmlinuz into a boot partition if I have to. (right now they are in the encrypted root partiton. I already have a boot partition thats about 300MB that I can move the files into. Refer to this: https://imagebin.ca/v/392Qqva76TZy )
Explain how to make a custom grub entry that supports booting from an encrypted partition and how to refer to it in the entry using a UUID (for multiple computer stability in OS booting)
Sorry for the trouble and thanks again!