Celejar:
> Brad Alexander <storm16@gmail.com> wrote:
> 
>> Linux admins used LUKS, and as a further step, I put /boot (the only
>> partition that cannot be encrypted) on a USB stick, so that if anyone
>> got the laptop, they had no access to the data.
> 
> Why does putting /boot on a USB stick gain you anything?
Because an unencrypted /boot may be altered by an attacker without you
noticing it.  Theoretically, the kernel may be replaced by another one
that reports your passphrase to the attacker.
J.
-- 
I feel yawning hollowness whilst talking to people at parties.
[Agree]   [Disagree]
                 <http://www.slowlydownward.com/NODATA/data_enter2.html>
Attachment:
signature.asc
Description: Digital signature