Timeline for boot / mount TrueCrypt / VeraCrypt system drive automatically w/o user intervention?
Current License: CC BY-SA 4.0
6 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
Jan 11, 2019 at 12:22 | comment | added | user533385 | I bitlocked the Win partition and using one key on USB flash and another Data partition is veracrypted and uses another USB flashdrive to unlock. However veracrypt startup is very much delayed (long time after logon), causing more troubles, it's such a shame they cannot use keyfile at boot, passwords are annoying and unsecure (you can throw away USB flashdrive but cannot burn your braincells holding the password). Bitlocker, on the other side, is untrustworthy. So not perfect solution since Win drive still contains tons of traces. | |
Jan 11, 2019 at 12:13 | comment | added | user533385 | but this is not for daily use? Keep unlocking and deleting the keyfile. | |
Jan 10, 2019 at 0:18 | comment | added | onlinespending | You can do this if you use BitLocker to encrypt the Windows partition and create another partition that mimics a USB drive that will hold the key file, which is one way to boot-up a encrypted Windows system. Basically you do a secure boot through Linux, which then copies the Windows Bitlocker keyfile from an encrypted location in the Linux file system to the "USB drive" partition. Then you have Linux reboot directly to Windows which now looks for the keyfile in that "USB drive" (say D: or whatever you used when installing Windows). Once you boot Windows you do a secure erase of the keyfile | |
Jan 6, 2019 at 0:50 | review | Late answers | |||
Jan 6, 2019 at 1:00 | |||||
Jan 6, 2019 at 0:35 | review | First posts | |||
Jan 6, 2019 at 0:47 | |||||
Jan 6, 2019 at 0:30 | history | answered | user533385 | CC BY-SA 4.0 |