- Aug 25, 2001
- 56,571
- 10,206
- 126
I know that TrueCrypt supports some sort of FDE, that can be used with Windows. But there is the "bootloader hole" - the idea is that someone with physical access to your machine, can install a trojaned bootloader, and steal your passphrase the next time you log in to your machine.
I was thinking of a way to fix this issue. What about storing the bootloader on a USB flash drive that you keep with you at all times. There would be no key material stored on the flash drive. The HD on the computer, would appear to be nothing but random data. There would be no bootloader on the computer to leave a trail. Does TrueCrypt support doing something like that? Does anyone know?
I was thinking of a way to fix this issue. What about storing the bootloader on a USB flash drive that you keep with you at all times. There would be no key material stored on the flash drive. The HD on the computer, would appear to be nothing but random data. There would be no bootloader on the computer to leave a trail. Does TrueCrypt support doing something like that? Does anyone know?