Home / Servers / Encrypted VPS
Real LUKS2 full disk encryption on hardware we own. Not a marketing checkbox. Your root partition is encrypted with a passphrase only you know. We can't read your data even if we wanted to.
How it works
Most providers that claim "encryption" just encrypt the underlying storage array. That protects against physical theft of drives, not against the provider reading your data. Our encryption happens inside your VM. The passphrase never leaves your terminal. We literally cannot decrypt your disk.
Encryption isn't a one-way street. You can enable it from your dashboard on any running Debian 12 server, and disable it later if you change your mind. The process is fully automated and takes about a minute each way.
This runs on servers Servury physically owns in a Montreal colocation facility. No third-party provider sits between your encrypted disk and the bare metal. The entire stack is ours.
We use LUKS2 with the argon2id key derivation function (the same one used by modern password managers). The in-place encryption preserves your existing data.
For the curious.
No. The LUKS passphrase is set by you inside a Dropbear SSH session. We never see it, store it, or transmit it. Without the passphrase, the disk contents are indistinguishable from random noise.
Your data is gone. There is no recovery mechanism, no backdoor, no master key. This is by design. If you lose the passphrase, you can reinstall the OS but your encrypted data is unrecoverable.
Minimal impact. LUKS2 with AES-XTS runs at near-native speeds on modern CPUs with AES-NI hardware acceleration, which all our processors support.
Yes. Any running Debian 12 server in Montreal can have encryption enabled from the Administration tab. Your existing data is preserved during the in-place encryption process.
Currently Montreal only, because it requires our owned hardware with a custom Debian 12 template. Other locations use third-party infrastructure where we can't customize the boot process.