Re: Full disk-encryption question

2023-10-23 Thread Marco M.
Am 23.10.2023 um 12:04:35 Uhr schrieb Michael Kjörling: > Encrypted /boot has been supported with GRUB 2 for a while. That > leaves only a minimal portion of GRUB in plaintext on storage. Although it is not default, so users should be aware that they need to do additional steps to encrypt /boot.

Re: Full disk-encryption question

2023-10-23 Thread Michael Kjörling
On 23 Oct 2023 13:59 +0200, from m...@dorfdsl.de (Marco M.): > Be aware that the boot loader and the /boot aren't encrypted by default > and they can be attacked (e.g. simply place a tainted kernel inside) by > anybody who has access to the harddisk. Encrypted /boot has been supported with GRUB 2

Re: Full disk-encryption question

2023-10-23 Thread Marco M.
Am 23.10.2023 um 12:53:14 Uhr schrieb lester29: > 1. Does an encryption key on the USB protect against rubber-hose > cryptanalysis? No, the LUKS headers are viewable. You need another layer around that supports hidden containers. > 2. Is it true that key on pendrive is more risky than

Re: Full disk-encryption question

2023-10-23 Thread Michael Kjörling
On 23 Oct 2023 12:53 +0200, from leste...@gazeta.pl (lester29): > 1. Does an encryption key on the USB protect against rubber-hose > cryptanalysis? I don't see how it would. Presumably you would have access to it; therefore that access could potentially be exploited through coercion or torture.

Full disk-encryption question

2023-10-23 Thread lester29
Hi I need to set up full disk encryption of the linux in my laptop. Questions: 1. Does an encryption key on the USB protect against rubber-hose cryptanalysis? 2. Is it true that key on pendrive is more risky than password because someone can steal the usb key and access data without the need