Minor note - in some instances the cloned slave would not work, as some volume encryption tools "sign" the encryption with the device details such as serial number and similar to prevent exactly this scenario, cloning.
↧