PS: a few thought to evila maid protection
well, if you think thats a good idea... I'd probably take it as a nice side
project having following acceptance criterias:
* systems kernel is located on encrypted partition, decrypted either by
grub luks module or by a preload kernel which then boots
Hi,
When setting up sys-usb and still using usb hid devices,
I noted:
* setting gets written to xen.cfg on efi partition... right? isn't this an
invitation for an easy to do evil maid attack combined with a compromised
usb device? If at least it would be part of initramfs so it is not that
Hi,
After reflecting about my needs and your answer I did it that way. Well
almost. Since I want to have sys-usb vm I had to bend efi partition beeing
an image file located in root. (Installed with efi on USB, after
installation before restart switching to console, dding the efi partition
to