• 0 Posts
  • 10 Comments
Joined 2 years ago
cake
Cake day: February 23rd, 2024

help-circle
  • TPM auto-unlock still relies on measured boot integrity (Secure Boot/PCRs), so it protects against offline theft and tampering when the machine is off or storage is removed.

    But if an attacker has repeated physical access during boot, the protection depends on whether you’ve added extra factors like a TPM PIN or pre-boot passphrase. Login prompts don’t re-protect the disk once it’s decrypted.

    In practice, for my use case (mostly shutdown or battery-dead scenarios), this is an acceptable trade-off for convenience. If your threat model includes targeted physical access during boot, then keeping a pre-boot secret is still the safer choice.




  • There is one caveat that worth mentioning, one can try (and probably achieve) disable many the privacy invasive treats in Ubuntu getting to the 0 or 1% that other distros provide out of the box where with Windows there isn’t much workaround.

    Honestly, Ubuntu is not even close bad to how many framed here in terms of privacy and can be more secure than Mint that still pushes Cinnamon X11 to users.

    Once you get Snap out and telemetry disabled Ubuntu is in the game.