Skip to main content
18 events
when toggle format what by license comment
S Jun 4, 2016 at 17:45 history suggested Jonathan Cross CC BY-SA 3.0
Typos: "plese", "unecrypted", "found" => "find", "has" => "have", "USB memory" => "external USB drive".
Jun 4, 2016 at 17:18 review Suggested edits
S Jun 4, 2016 at 17:45
Apr 11, 2016 at 7:21 history edited MV. CC BY-SA 3.0
added link to source files of old lfde project.
Apr 2, 2016 at 1:21 history edited MV. CC BY-SA 3.0
added additional information about the lfde site.
Apr 2, 2016 at 1:16 comment added MV. @에이바 : no, that is related (using LUKS with a TPM) but is not the same project previously hosted at lfde.org (which now is a site about an aeroclub).
Mar 3, 2016 at 19:37 comment added 에이바 Is this the same project? github.com/koue/lfde
Feb 20, 2015 at 10:11 comment added Peque @MV.: Thanks. I may test it myself and add an answer here with more detailed steps to use encrypted /boot partitions with GRUB2.
Feb 20, 2015 at 9:50 comment added MV. @Peque Done, added a note about the latest version of GRUB2 (2.00). It now has code to access LUKS and GELI encrypted partitions. However, I have not tested them, I'm relying on the Changelog of the latest version.
Feb 20, 2015 at 9:48 history edited MV. CC BY-SA 3.0
updated information about grub2
Feb 20, 2015 at 9:05 comment added Peque @MV.: could this answer be updated/reviewed? Does GRUB2 have support for loading and decrypting LUKS partitions nowadays? Could this allow users to encrypt /boot partition as well?
Jan 25, 2013 at 11:24 comment added MV. Yes, lfde.org has been down from some months (and the author blog is gone too). Pity is all the work done by the author of the LFDE project is gone, as it was all hosted in his personal website (another reason to leverage sites like SourceForge, Google Code, GitHub or similar).
Jan 25, 2013 at 8:31 comment added user6860 lfde.org seems to be down :(
Jan 27, 2012 at 1:30 history migrated from stackoverflow.com (revisions)
Jul 21, 2011 at 2:16 comment added MV. Just to add more information about the weakness of using a non-encrypted /boot partition (but it also apply for an non-encrypted boot loader): twopointfouristan.wordpress.com/2011/04/17/… (how to modify the boot partition in 10 minutes of physical access, to retrieve the mount passphrase plus any other file in the encrypted partition)
May 24, 2011 at 10:08 vote accept CommunityBot
May 24, 2011 at 8:40 comment added MV. I don't know any working implementation, but EFI/UEFI has the option to include a custom EFI Boot Manager to replace a common boot loader, maybe adding a decryption layer to decrypt the data (of course then you'll need an EFI platform). Or maybe some of the project related to CoreBoot (ADLO, SeaBIOS, OpenBIOS, etc.) can be modified to do that. Just ideas.
May 19, 2011 at 15:49 comment added Grodriguez Decrypting at the BIOS level would be a very good solution indeed (I have considered this as an option)...
May 18, 2011 at 14:15 history answered MV. CC BY-SA 3.0