Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

4
  • Perhaps you should set a password for your Windows login? You could verify the disk encryption by booting to other media and attempting to mount, browse the disk.
    – adric
    Commented Oct 10, 2013 at 18:52
  • 1
    When I set a password for my Windows login it still automatically starts all services, e.g. Teamviewer, before I have even logged in. This hardly makes me feel that the data is inaccessible without authenticating to Windows with my username/password. Booting other media (e.g. Live CD) is a good idea, although Linux not being able to read it, doesn't mean that Windows can't. I don't know of bootable Windows Live CD's though, I'll have to figure that out.
    – ujjain
    Commented Oct 10, 2013 at 18:59
  • Yeah, that doesn't sound so great. Typically a Full Disk Encryption system uses a boot loader password prompt and/or hooks into the OS for authentication. If you can get into the operating system without any authentication then you don't have any protection against someone else accessing your data locally. Remotely is also a concern..
    – adric
    Commented Oct 10, 2013 at 19:30
  • To your other point, Linux can read Windows files just fine (these days) so a Linux live image is a good way to test disk encryption. If your FDE is working then the Linux environment should be able to see the drive and it's partitions but not interpret the data.
    – adric
    Commented Oct 10, 2013 at 19:32