:: Re: [DNG] booting security, encryp…
Top Page
Delete this message
Reply to this message
Author: Didier Kryn
Date:  
To: dng@lists.dyne.org
Subject: Re: [DNG] booting security, encryption (Re: About making /boot a mount point)
Le 20/11/2025 à 17:39, g4sra via Dng a écrit :
> -- snip --
>
>> My home can contain secret stuff. The OS is public and can be
>> dowloaded freely. I make backups of my home, not of the OS. Is there
>> something wrong, or maybe stupid, in this habit?
> That depends on what value you place on things.
>
> There are plenty of 'personal to your setup' configuration files in
> the OS. Network connections, wifi passwords, certificates. /etc/shadow
> can be brute forced to reveal system passwords that you may use again
> or elsewhere, etc.
>
> An OS binary (or anything in /boot including grub) can be compromised
> to allow access to your encrypted /home after you have logged in and
> unlocked it.

    You are absolutely right. There are, at least wpa_supplicant.conf
and shadow. In wpa_supplicant.conf, the keys are not even encrypted.