This makes a world of difference. I know many people may know of it but may not actually do it. It Protects your files in case your computer is ever stolen and prevents alphabet agencies from just brute forcing into your Laptop or whatever.

I found that Limine (bootloader) has the fastest decryption when paired with LUKS at least for my laptop.

If your computer isn’t encrypted I could make a live USB of a distro, plug it into your computer, boot, and view your files on your hard drive. Completely bypassing your Login manager. If your computer is encrypted I could not. Use a strong password and different from your login

Benefits of Using LUKS with GRUB Enhanced Security

  • Data Protection: LUKS (Linux Unified Key Setup) encrypts disk partitions, ensuring that data remains secure even if the physical device is stolen.
  • Full Disk Encryption: It can encrypt the entire disk, including sensitive files and swap space, preventing unauthorized access to confidential information.

Compatibility with GRUB

  • Unlocking from Bootloader: GRUB can unlock LUKS-encrypted partitions using the cryptomount command, allowing the system to boot securely without exposing sensitive data.
  • Support for LVM: When combined with Logical Volume Management (LVM), LUKS allows for flexible partition management while maintaining encryption.
    • notabot@piefed.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      Given its nature and functionality, it’s hard to see how the TPM subsystem itself could be backdoored in any meaningful fashion without the rest of the CPU also being compromised. Whilst that is certainly possible, and the remote management engines (IME and such) almost certainly are, it seems more likely to me that the encryption algorythms themselves are deliberately weakened in some way. The NSA, famously, have done that sort of thing before, subtly influencing aspects of the design of cryptographic systems to make them easier for them to break. It would not surprise me, for example, to discover that the supposedly random key material is actually linked to something like your CPU’s ID.

      None-the-less, using functionality help prevent someone who has your password, but isn’t a government actor, decrypting your data.