Am 23.10.2023 um 12:04:35 Uhr schrieb Michael Kjörling:
> Encrypted /boot has been supported with GRUB 2 for a while. That
> leaves only a minimal portion of GRUB in plaintext on storage.
Although it is not default, so users should be aware that they need to
do additional steps to encrypt /boot.
On 23 Oct 2023 13:59 +0200, from m...@dorfdsl.de (Marco M.):
> Be aware that the boot loader and the /boot aren't encrypted by default
> and they can be attacked (e.g. simply place a tainted kernel inside) by
> anybody who has access to the harddisk.
Encrypted /boot has been supported with GRUB 2
Am 23.10.2023 um 12:53:14 Uhr schrieb lester29:
> 1. Does an encryption key on the USB protect against rubber-hose
> cryptanalysis?
No, the LUKS headers are viewable. You need another layer around that
supports hidden containers.
> 2. Is it true that key on pendrive is more risky than
On 23 Oct 2023 12:53 +0200, from leste...@gazeta.pl (lester29):
> 1. Does an encryption key on the USB protect against rubber-hose
> cryptanalysis?
I don't see how it would. Presumably you would have access to it;
therefore that access could potentially be exploited through coercion
or torture.
Hi
I need to set up full disk encryption of the linux in my laptop.
Questions:
1. Does an encryption key on the USB protect against rubber-hose
cryptanalysis?
2. Is it true that key on pendrive is more risky than password because
someone can steal the usb key and access data without the need
5 matches
Mail list logo