All of lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] Detecting the use of a keyfile
@ 2013-05-23 13:27 sector9
  2013-05-23 14:55 ` Arno Wagner
  0 siblings, 1 reply; 6+ messages in thread
From: sector9 @ 2013-05-23 13:27 UTC (permalink / raw)
  To: dm-crypt

During the boot stage is it possible for an attacker with physical
access to detect if a keyfile is used to unlock an encrypted volume?

Does it yield to protest that the keyfile is lost/unknown/destroyed when
in reality there is no keyfile but instead a regular non-keyfile
passphrase?

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2013-05-23 17:36 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-05-23 13:27 [dm-crypt] Detecting the use of a keyfile sector9
2013-05-23 14:55 ` Arno Wagner
2013-05-23 15:21   ` sector9
2013-05-23 15:40     ` Arno Wagner
2013-05-23 17:13       ` sector9
2013-05-23 17:36         ` Arno Wagner

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.