From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from moutng.kundenserver.de (moutng.kundenserver.de [212.227.17.8]) by mail.saout.de (Postfix) with ESMTP for ; Thu, 4 Nov 2010 13:16:04 +0100 (CET) Date: Thu, 4 Nov 2010 13:16:02 +0100 From: Heinz Diehl Message-ID: <20101104121602.GA9167@fancy-poultry.org> References: <1288808772.11023.5.camel@acer> <20101103223431.GA20934@tansi.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20101103223431.GA20934@tansi.org> Subject: Re: [dm-crypt] Feitian PKI donation to dm-crypt projetc List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de On 04.11.2010, Arno Wagner wrote: > Having a not completely encrypted initrd and kernel does > not qualify as "completely encrypted system on boot". How would you boot such a system when initramfs / initrd is encrypted? I'm just curious.