Remix.run Logo
hparadiz 3 hours ago

Windows 11 has tpm required to enforce full disk encryption that is pinned to a given machine. Linux would do well to do the same thing. It's possible but almost no one does it.

2 hours ago | parent | next [-]
[deleted]
turminal 2 hours ago | parent | prev | next [-]

This sounds like a great way to lose data when the machine dies unexpectedly.

michaelt an hour ago | parent | next [-]

Linux should replicate Microsoft's feature where they back up your "full disk encryption" keys to your cloud account, completely unencrypted, and share them with the cops.

dgxyz 2 hours ago | parent | prev [-]

You can print recovery codes. Just chuck them in your safe.

Cryptography is only safe against someone who doesn't come and beat the password out of you if they want it. In my case, only my laptop is encrypted so if I lose it when I'm out it's useless.

dummydummy1234 2 hours ago | parent | prev [-]

What is the benefit of having full disk encryption pinned to a machine?

vbezhenar 2 hours ago | parent | next [-]

The benefit is to not type encryption password on every boot. TPM stores the encryption key and Secure Boot ensures that the system is not tampered.

That said, I think that it's better to use alternative approach. Use unencrypted signed system partition which presents login screen. After user typed their username and password, only user home gets decrypted. This scheme does not require TPM and only uses secure boot to ensure that system partition has not been altered. I think that macOS uses similar approach.

ab71e5 2 hours ago | parent [-]

Kinda like how I have it set up in linux except the system partition is the uki and the user password is LUKS2 passphrase

hparadiz 2 hours ago | parent | prev [-]

Anti theft