@syntax i always carry by bootloader with me on a usb flashdrive, that way all thats on my drive as a useless encrypted blob.
@blacklight447 Good idea. Personally I don't really need to go to those lengths as my laptop never leaves the house. I have a "travel" netbook which is stripped of any personal info and which I just use on the road for writing, browsing etc.
@syntax An attacker with physical access to your system can unplug the hard disk, and plug it into their computer to get at everything that isn’t encrypted with no access control.
But even if you only use partial disk encryption, and they boot straight into a root shell, then how are they gonna decrypt the encrypted partition? All they can do is sit there running your computer, not accessing the sensitive stuff.
@penny @syntax Haha yeah. Good old hardware keyloggers. Most people don’t have to worry about that though. The bad guys are mostly counting on low effort, secretive strategies, like passively sniffing emails. They can’t afford to break into everyone’s house and bug everyone’s computer. Though…