Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 8 Sep 2015 19:51:16 +0100
From:      Igor Mozolevsky <igor@hybrid-lab.co.uk>
To:        "Li, Xiao" <xaol@amazon.com>
Cc:        Hackers freeBSD <freebsd-hackers@freebsd.org>, Analysiser <analysiser@gmail.com>
Subject:   Re: Passphraseless Disk Encryption Options?
Message-ID:  <CADWvR2hHFYYKLGAW-YsAK_XQ7E5bdWjDxbTMgDfk4Ca8B05LcA@mail.gmail.com>
In-Reply-To: <D2147761.1A53%xaol@amazon.com>
References:  <8B7FEE2E-500E-49CF-AC5E-A2FA3054B152@gmail.com> <CADWvR2iv7xz02Fw9b=159%2BSMuphQGRKZsfyy9DDeqGMxn=p1BA@mail.gmail.com> <D214715D.1A32%xaol@amazon.com> <CADWvR2iVubsBQjnvQ8mDGGS7ujsR8wPQ2RAxn=kvFkmVGQkXiQ@mail.gmail.com> <D2147761.1A53%xaol@amazon.com>

index | next in thread | previous in thread | raw e-mail

On 8 September 2015 at 19:35, Li, Xiao <xaol@amazon.com> wrote:

> Agreed, that¹s why I¹m stuck in here: it seems like something either
> unachievable or haven¹t been done before. I mentioned Apple¹s method is
> only because it is something similar in that both requires a full disk
> encryption on startup disk. But Apple¹s way is like to decrypt the disk on
> login; I¹m trying to decrypt the disk during prelogin after the boot.
>

I think you're missing the point- I suspect Apple's login *is* the decrypt
process- OS X needs something from the user to give access to the data;
without the user typing in their password, the data on the disk (as I said)
is just a source of entropy.

-- 
Igor M.


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADWvR2hHFYYKLGAW-YsAK_XQ7E5bdWjDxbTMgDfk4Ca8B05LcA>