Hi!

Michael Kesper schrieb:
>> Of course. The idea is that you can encrypt everything but the kernel
>> +initrd, which is needed in order to decrypt the partition (better said,
>> to set up the dm-crypt mapping).
>> And an USB stick could be always with you.
> 
> What is the additional gain to having an unencrypted /boot partition on
> the same device?

"They" will have difficulties installing a keylogger if the unencrypted
/boot is always in your pocket and the HDD contains just encrypted
gibberish.

I wonder when Linux will be able to utilize a TPM to integrity-protect
/boot.

cu, Sven

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to