[–] ImSureImPerfect [S] ago
So the bootloader is a potential vulnerable spot then? Interesting.
When you say bad for performance, do you mean it's not encrypted well enough? Or that it slows down the PC? What kind of bad are we looking at?
[–] ImSureImPerfect [S] 0 points 1 point 1 point (+1|-0) ago
Jesus. That seems like a little much, but I guess if we're talking about perfect protection it might be the only way.
I'm suddenly very glad that I don't need encryption so good that it's backed up by thermite.
[–] xyzzy 0 points 2 points 2 points (+2|-0) ago
So the bootloader is a potential vulnerable spot then?
I wouldn't say it's vulnerable, but readable.
When you say bad for performance, do you mean it's not encrypted well enough? Or that it slows down the PC? What kind of bad are we looking at?
It slows down. Since every file read from disk has to be decrypted and only part of them remain cached in the RAM. So reading from disk is slow and uses CPU power.
[–] ImSureImPerfect [S] ago
Assuming you had a strong PC - say, one designed to be powerful enough to do some serious multitasking, and to run some demanding software - this would be less of an issue then, yes?
Thanks for answering all of my nitpicky questions, by the way. This is probably the last one. My curiosity is getting pretty satisfied.
[–] NinjaKitteh ago
You could have your /boot on a USB-stick, that way you can be sure it has not been tampered with.