• Strawberry@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 days ago

    Is the boot partition on a separate drive because the unencrypted partition would somehow reveal information about the drive that could be used to analyze the encrypted portions?

    • nao@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 days ago

      Someone could install something on the unencrypted boot partition to leak the key next time it gets used

      • Strawberry@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 day ago

        Would this not apply even if the unencrypted boot partition is on another physical drive? You still have to enter the passphrase into the prompt at boot. Wouldn’t a compromised boot partition be able to access the passphrase in memory at that time, and use that to access the key?

        • nao@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 day ago

          It would, but I assumed the idea was to have the external drive with you at all times so no one could tamper with it. Otherwise I don’t see the benefit, a permanently connected external drive may as well be internal.