This is my disk layout:

500 GB Linux - BTRFS

100 GB Windows - NTFS

400 GB Storage - NTFS (shared between linux and windows)

I want to encrypt everything. For Linux I can use luks2 but what I’m supposed to do for Windows ? (No bitlocker please)

Will veracrypt replace refind boot manager?

Note: I am talking about the one that asks password before boot (full encryption)

  • Maiq@lemy.lol
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    1 day ago

    I don’t know if there is or anything about disk encryption for windows.

    If grub is installed, grub should load instead of windows bootloader forcing you to decrypt before your boot selection. This will give the appearance that windows is encrypted by luks.

    • ArcaneSlime@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      3
      ·
      1 day ago

      But if secure boot is off (or is turned off because you didn’t set a pass), and someone boots any live distro*, the linux disk will still require a pass but the windows disk still won’t, right?

      I know when I boot into a live distro on a win10 pc I have without FDE, I can mount the hdd and bypass my windows passkey. What I don’t know is if dual booting linux off the same drive would behave the same where you could still then mount the windows partition. I figure separate drives would function the way I expect.

      *Any distro except Tails which blocks you from mounting the actual hdd for security reasons of course.

      • Maiq@lemy.lol
        link
        fedilink
        arrow-up
        3
        ·
        1 day ago

        My explanation above just gives the illusion of entire computer encryption.

        Say you have a separate hd for each OS. Each with bootloaders on their drives. To bypass grub running luksopen you can boot directly into windows in the bios, in this instance the windows bootloader will be used to load windows. However if your bios is set to boot your Linux HD and grub has successfully found your windows drive and created a boot entry for it, it should be selectable after luks decryption. This can give the illusion that windows is encrypted while not really being so to an advanced user. There is nothing preventing you from mounting windows as its not really encrypted, just the way grub loads Luks before OS selecton. If I remember correctly systemd-boot loads OS selection before luksopen giving no appearance of encryption till after your OS selection, you should be able to boot windows without the false sense of drive decryption.