On Mon, Jun 2, 2014 at 6:06 AM, Alan McKinnon <[email protected]> wrote: > You log in (or boot up), the system asks for a password/key or whatever, > then unlocks the encryption used.
The more common approach is to not prompt for a password/key, but instead store it in the TPM using a trusted boot path. This is possible on Linux, but the only "distro" using it is ChromeOS as far as I'm aware (granted, there are probably more Chromebooks in desktop use these days than all the other distros combined). On Windows this is how just about everybody does it. This is far more convenient as it does not require a password when booting. If you don't trust the person who will be using the machine it is more secure against attacks by the legitimate user (typically in these situations the computer is owned by a corporation, not the end-user). On the other hand, if somebody steals your laptop they can boot it without issue. Then if they have some way to exploit the running OS they can get at the contents of the drive (though the home directory could still be encrypted using the user's password on top of full-disk encryption). For attacks by anybody other than the NSA using the TPM is potentially a lot more secure. Instead of depending on a bunch of rounds of crypto to prevent brute-forcing of a simple password you are depending on the security of the TPM. The TPM can be told to forget the key after a certain number of failed attempts to get at it. If you're worried about the NSA it seems likely that your TPM has a back door for them, but my sense is that if the NSA is THAT determined to get your data there really isn't anything you're going to be able to do about it. Rich

