Author: Didier Kryn Date: To: dng@lists.dyne.org Subject: Re: [DNG] booting security,
encryption (Re: About making /boot a mount point)
Le 20/11/2025 à 17:39, g4sra via Dng a écrit : > -- snip --
>
>> My home can contain secret stuff. The OS is public and can be
>> dowloaded freely. I make backups of my home, not of the OS. Is there
>> something wrong, or maybe stupid, in this habit?
> That depends on what value you place on things.
>
> There are plenty of 'personal to your setup' configuration files in
> the OS. Network connections, wifi passwords, certificates. /etc/shadow
> can be brute forced to reveal system passwords that you may use again
> or elsewhere, etc.
>
> An OS binary (or anything in /boot including grub) can be compromised
> to allow access to your encrypted /home after you have logged in and
> unlocked it. You are absolutely right. There are, at least wpa_supplicant.conf
and shadow. In wpa_supplicant.conf, the keys are not even encrypted.