this post was submitted on 13 Nov 2025
12 points (77.3% liked)

Linux

10210 readers
475 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
 

Sounds like a misnomer to me.

you are viewing a single comment's thread
view the rest of the comments
[–] Nawor3565@lemmy.blahaj.zone 28 points 1 week ago (8 children)

Cause there's no user data stored on EFI, and saying "almost-full-disk-except-for-the-EFI-partition-encryption" is a bit cumbersome and, obviously, pedantic.

[–] onlinepersona@programming.dev 1 points 1 week ago (7 children)

Sure, but unencrypted means it can be tampered with. The bootloader can be modified to write your password to disk and once you boot, submit that to a server somewhere - or worse.

[–] dgdft@lemmy.world 4 points 1 week ago (3 children)

There’s also PXE boot, secure boot, carrying around a live image on a flash drive, etc.

But any attacker advanced enough to tamper with your EFI partition in an evil-maid scenario has plenty of other options to log and steal your encryption passphrase, so it’s generally a moot point.

[–] onlinepersona@programming.dev -3 points 1 week ago (2 children)

With that logic there's no need to even encrypt your partitions 🤷

[–] dgdft@lemmy.world 10 points 1 week ago

Absolutely not — the skill level needed to tamper with a bashrc, pull credentials + keys, or generally hunt for sensitive info on an unencrypted disk is worlds apart from the skill level needed to modify an EFI binary.

[–] spiffpitt@lemmy.world 7 points 1 week ago

security isn't real, just increasing deterrence for attackers.

if you can access something, they can access it, it's just a matter of effort needed to get there.

load more comments (3 replies)
load more comments (3 replies)