Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Careful, disk encryption usually doesn't cover the entire disk. So an attacker can place an evil initramfs in the /boot partition that stores away your disk encryption passphrase, for example.

This is even easier if the operating system partition is plaintext and only the data partition is encrypted. Then it's trivial to modify any binary, library, or startup scripts!

Encryption just means an attacker cannot get at the data right away. But once the admin brings up the system again (not knowing something has been tampered with) it's pretty easy to get access.



This is exactly the reason why they say they are not restarting the site now but are building a new fresh server instead.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: