1 |
On May 25, 2017 1:04:07 PM GMT+02:00, Kai Krakow <hurikhan77@×××××.com> wrote: |
2 |
>Am Thu, 25 May 2017 08:34:10 +0200 |
3 |
>schrieb "J. Roeleveld" <joost@××××××××.org>: |
4 |
> |
5 |
>> It is possible. I have it set up like that on my laptop. |
6 |
>> Apart from a small /boot partition. The whole drive is encrypted. |
7 |
>> Decryption keys are stored encrypted in the initramfs, which is |
8 |
>> embedded in the kernel. |
9 |
> |
10 |
>And the kernel is on /boot which is unencrypted, so are your encryption |
11 |
>keys. This is not much better, I guess... |
12 |
|
13 |
A file full of random characters is encrypted using GPG. |
14 |
Unencrypted, this is passed to cryptsetup. |
15 |
|
16 |
The passphrase to decrypt the key needs to be entered upon boot. |
17 |
How can this be improved? |
18 |
|
19 |
-- |
20 |
Joost |
21 |
|
22 |
-- |
23 |
Sent from my Android device with K-9 Mail. Please excuse my brevity. |