▲ | teddyh 3 months ago | |||||||
An adversary can usually only modify code that executes in the boot process if they already have root privileges, or if they have physical access. In either of those cases the game is already over anyway. | ||||||||
▲ | bigfatkitten 3 months ago | parent [-] | |||||||
> or if they have physical access. If you're not worried about physical access, then why would you encrypt your disk at all? | ||||||||
|