Timeline for boot / mount TrueCrypt / VeraCrypt system drive automatically w/o user intervention?
Current License: CC BY-SA 3.0
6 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
Jan 6, 2019 at 0:30 | answer | added | user533385 | timeline score: 1 | |
Mar 20, 2017 at 10:17 | history | edited | CommunityBot |
replaced http://superuser.com/ with https://superuser.com/
|
|
May 13, 2016 at 18:17 | comment | added | onlinespending | the idea is that the keyfile would be stored remotely or on a usb drive. and yes, Bitlocker does allow you to do this. They even allow you to only store the key in the TPM | |
May 13, 2016 at 18:10 | comment | added | onlinespending | yes, it does. you can use an empty passphrase and keyfile, though it appears there is a restriction for system partitions. I may just have to use Bitlocker since that appears I can do unattended boot with the use of a keyfile. Don't be so fixated on the mention of a blank password when that's not the heart of the question, nor was it ever intended to be a solution without the use of a keyfile. | |
May 13, 2016 at 17:59 | comment | added | onlinespending | through the use of a keyfile. plus not entirely pointless depending on what your goals are. if you're merely trying to avoid prying eyes from seeing files in the clear if someone were to steal your computer, than this at the very least would discourage that | |
May 13, 2016 at 17:39 | history | asked | onlinespending | CC BY-SA 3.0 |