Simple answer: No.
Complicated answer:
Encrypting a disk or partition will erase everything currently on
that disk or partition, so to encrypt a disk you also should remove the
contents of the disk. You should make appropriate data backups prior to
starting. Obviously, this means that you should reinstall the system to
use full disk encryption, no other way around. This is because random
data will be written over the entire disk to make more difficult the
recovering of the data.
If you want full volume encryption you either have to have a 2nd hard drive..set it up manually and then transfer the data or do a backup of your lxle root partition, use a lubuntu disc to setup encryption and then restore the lxle data Oddly enough I see plenty of indicators that ubuntu's alternate install disk can be used to setup an encrypted drive but that's not an option for us. At least a few of the posts indicate lubuntu's discs DO work with whole disc encryption while my personal tests seem to indicate lxle's do not. I only recall seeing the whole disc option on lxle's 14.04 though and not on the 12.04.
3. Create partitions.sudo -i
4. Create logical volumes for the system directory, swap area (and the home diectory).Let's say that I have the next partitions:UUID's of /dev/sda6 : 66666666-6666-6666-6666-666666666666/dev/sda5: boot partition
/dev/sda6: luks encrypted partition to create logical volumes in order to install 32bit LXLE14.
Additionally let's say I gave the mapping name "crypt_sda6" to the /dev/sda luks encrypted partition
At this point, let's say that the parts of the lsblk command result is appeared like:(As I wrote above, please note that the hibernation with encrypted swap partition on my machine does not work.)└─sda6
└─crypt_sda6 (dm-0) 252:0 0 240G 0 crypt
├─volumes-swap (dm-1) 252:1 0 3G 0 lvm [SWAP]
├─volumes-home (dm-2) 252:2 0 30G 0 lvm /home
└─volumes-lxle14 (dm-3) 252:3 0 30G 0 lvm /
Just normal stuff; also don't forget to specify volumes-swap and volumes-home logical volumes.
At the end of the installation, do not allow to reboot.
7. Create /etc/crypttab file with content like:Then mount the followings:/dev/sda5 to /mnt/lxle14/boot
/dev/mapper/volumes-home to /mnt/lxle14/home
/dev to /mnt/lxle14/dev
/proc to /mnt/lxle14/proc
/sys to /mnt/lxle14/sys
8. Create /usr/share/initramfs-tools/conf-hooks.d/forcecryptsetup file with next content:crypt_sda6 UUID=66666666-6666-6666-6666-666666666666 none luks
9. Create /usr/share/initramfs-tools/conf.d/cryptroot file with content like:export CRYPTSETUP=y
10. chroot /mnt/lxle14target=crypt_sda6,source=UUID=66666666-6666-6666-6666-666666666666,key=none,rootdev,lvm=volumes-lxle14
target=crypt_sda6,source=UUID=66666666-6666-6666-6666-666666666666,key=none,lvm=volumes-swap
target=crypt_sda6,source=UUID=66666666-6666-6666-6666-666666666666,key=none,lvm=volumes-home
It looks like you're new here. If you want to get involved, click one of these buttons!