Date: Tue, 8 Sep 2015 19:51:16 +0100 From: Igor Mozolevsky <igor@hybrid-lab.co.uk> To: "Li, Xiao" <xaol@amazon.com> Cc: Hackers freeBSD <freebsd-hackers@freebsd.org>, Analysiser <analysiser@gmail.com> Subject: Re: Passphraseless Disk Encryption Options? Message-ID: <CADWvR2hHFYYKLGAW-YsAK_XQ7E5bdWjDxbTMgDfk4Ca8B05LcA@mail.gmail.com> In-Reply-To: <D2147761.1A53%xaol@amazon.com> References: <8B7FEE2E-500E-49CF-AC5E-A2FA3054B152@gmail.com> <CADWvR2iv7xz02Fw9b=159%2BSMuphQGRKZsfyy9DDeqGMxn=p1BA@mail.gmail.com> <D214715D.1A32%xaol@amazon.com> <CADWvR2iVubsBQjnvQ8mDGGS7ujsR8wPQ2RAxn=kvFkmVGQkXiQ@mail.gmail.com> <D2147761.1A53%xaol@amazon.com>
index | next in thread | previous in thread | raw e-mail
On 8 September 2015 at 19:35, Li, Xiao <xaol@amazon.com> wrote: > Agreed, that¹s why I¹m stuck in here: it seems like something either > unachievable or haven¹t been done before. I mentioned Apple¹s method is > only because it is something similar in that both requires a full disk > encryption on startup disk. But Apple¹s way is like to decrypt the disk on > login; I¹m trying to decrypt the disk during prelogin after the boot. > I think you're missing the point- I suspect Apple's login *is* the decrypt process- OS X needs something from the user to give access to the data; without the user typing in their password, the data on the disk (as I said) is just a source of entropy. -- Igor M.help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADWvR2hHFYYKLGAW-YsAK_XQ7E5bdWjDxbTMgDfk4Ca8B05LcA>
