@crft #LUKS v2 is the gold standard 馃槉
Setup is easy, and the UX thereafter is very smooth:
```bash
# initialise the encryption volume
sudo cryptsetup -v --type luks2 luksFormat /dev/sdx
# mount it so that you can create a filesystem within it
sudo cryptsetup luksOpen /dev/sdx DRIVE_ALIAS
# create an EXT4 volume inside the encrypted volume to actually store the files
sudo mkfs.ext4 /dev/mapper/DRIVE_ALIAS
# close the crypto device to unmount it
sudo cryptsetup luksClose DRIVE_ALIAS
# now you can unplug, replug & password should work to access the drive in Nautilus or other major distro's file manager app
```
Let me know if this is an internal drive, I can share brief annotated instructions for setting up `crypttab` & `fstab` so they can be unlocked and mounted at boot.