• nao@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 days ago

    Someone could install something on the unencrypted boot partition to leak the key next time it gets used

    • Strawberry@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 day ago

      Would this not apply even if the unencrypted boot partition is on another physical drive? You still have to enter the passphrase into the prompt at boot. Wouldn’t a compromised boot partition be able to access the passphrase in memory at that time, and use that to access the key?

      • nao@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        It would, but I assumed the idea was to have the external drive with you at all times so no one could tamper with it. Otherwise I don’t see the benefit, a permanently connected external drive may as well be internal.