Someone wrote in [personal profile] mjg59 2023-08-05 11:49 pm (UTC)

encrypted swap solves for most of this?

Per paragaph five: if the attacker already has root, the worst threats are already live. Preventing the pwned root account from altering future sessions is, to me, a very minor concern. The largest threats for end users being full access to data, keystrokes, and hardware. And servers probably aren't asking for hibernation. So then, blocking hibernation for desktop users for this attack vector alone doesn't make sense (yet).

If encrypted swap is still a no-go, what about a swap file within encrypted / ? Does that allow secure boot?

Post a comment in response:

If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org