mycodesucks@lemmy.world to linuxmemes@lemmy.world · 20 hours agoSekyuriteelemmy.worldimagemessage-square48fedilinkarrow-up1656arrow-down111
arrow-up1645arrow-down1imageSekyuriteelemmy.worldmycodesucks@lemmy.world to linuxmemes@lemmy.world · 20 hours agomessage-square48fedilink
minus-squarenialv7@lemmy.worldlinkfedilinkarrow-up4arrow-down1·2 hours agoDepends on your threat model. If you are defending against people stealing your hard drive and reading your data, then this is perfectly fine.
minus-squarenibbler@discuss.tchncs.delinkfedilinkEnglisharrow-up4·2 hours agoif it’s logging in automatically it needs the required encryption key available on the disk in clear. so the stolen hard drive will boot and unlock in any computer, no?
minus-squarenialv7@lemmy.worldlinkfedilinkarrow-up2·40 minutes agonot necessarily if the key is on TPM for example.
minus-squarenibbler@discuss.tchncs.delinkfedilinkEnglisharrow-up1·16 minutes agothis is correct, but a very strict condition in relation to the general statement i reacted to :-)
Depends on your threat model. If you are defending against people stealing your hard drive and reading your data, then this is perfectly fine.
if it’s logging in automatically it needs the required encryption key available on the disk in clear. so the stolen hard drive will boot and unlock in any computer, no?
not necessarily if the key is on TPM for example.
this is correct, but a very strict condition in relation to the general statement i reacted to :-)