45mg <45mg.wri...@gmail.com> writes:

>>> What most distributions do is use something like `ukify` to generate a
>>> bootable UEFI image that has includes the required crypto modules.

Please disregard this, I don't actually know how prevalent UKIs are.
What I was going for was - usually the kernel and initramfs images are
written to eg. `/boot`, which can be unencrypted. And the initramfs is
able to mount the encrypted volume.
(To fully secure this setup you'd need Secure Boot, which is addressed
in the bootloader rewrite I think...)

Reply via email to