Seeing this also with Precise and a Dell XPS m1530. I've been thinking of how we could get around the problem without a kludge.
It occurs to be that the authenticated fingerprint could issue a unique hash that could be used by ecryptfs as a second passphrase - rather like cryptsetup with LUKS can have multiple key slots for the same protected volume. I need to dig into ecryptfs to find out if this would be possible.
Seeing this also with Precise and a Dell XPS m1530. I've been thinking of how we could get around the problem without a kludge.
It occurs to be that the authenticated fingerprint could issue a unique hash that could be used by ecryptfs as a second passphrase - rather like cryptsetup with LUKS can have multiple key slots for the same protected volume. I need to dig into ecryptfs to find out if this would be possible.