Am Thu, 25 May 2017 08:34:10 +0200
schrieb "J. Roeleveld" <jo...@antarean.org>:

> It is possible. I have it set up like that on my laptop.
> Apart from a small /boot partition. The whole drive is encrypted.
> Decryption keys are stored encrypted in the initramfs, which is
> embedded in the kernel.

And the kernel is on /boot which is unencrypted, so are your encryption
keys. This is not much better, I guess...

> On May 25, 2017 12:40:12 AM GMT+02:00, Rich Freeman
> <ri...@gentoo.org> wrote:
> >On Wed, May 24, 2017 at 2:16 PM, Andrew Savchenko
> ><birc...@gentoo.org> wrote:  
> >>
> >> Apparently it is pointless to encrypt swap if unencrypted
> >> hibernation image is used, because all memory is accessible through
> >> that image (and even if it is deleted later, it can be restored
> >> from hdd and in some cases from ssd).
> >>  
> >
> >Yeah, that was my main concern with an approach like that.  I imagine
> >you could use a non-random key and enter it on each boot and restore
> >from the encrypted swap, though I haven't actually used hibernation
> >on linux so I'd have to look into how to make that work.  I imagine
> >with an initramfs it should be possible.


-- 
Regards,
Kai

Replies to list-only preferred.


Reply via email to