From a2616e852ba1d861209f66ce4afc8728117a1acd Mon Sep 17 00:00:00 2001
From: Francis Rowe
Date: Wed, 20 May 2015 10:25:31 +0100
Subject: docs/gnulinux/encrypted_*.html: Remove notes about --unrestricted
These instructions were dangerous. I was provided with them by a
user who found them, and I thought that it would be safe to allow
access to boot the HDD so long as the OS was encrypted. However,
this is not the point. With that option unrestricted, anyone with
physical access could replace the HDD with another LUKS-encrypted
one with the same set up (just a different system, different key,
different passphrase, etc) and now they are able to run their own
code on that laptop. This *is* dangerous. There is a lot that an
attacker can do to the laptop if they are able to boot an OS on it!
Basically, Francis Rowe was being foolish to add these instructions.
Now he's wised up a bit.
---
docs/gnulinux/encrypted_trisquel.html | 6 ------
1 file changed, 6 deletions(-)
(limited to 'docs/gnulinux/encrypted_trisquel.html')
diff --git a/docs/gnulinux/encrypted_trisquel.html b/docs/gnulinux/encrypted_trisquel.html
index 0b7864e7..32eeaff7 100644
--- a/docs/gnulinux/encrypted_trisquel.html
+++ b/docs/gnulinux/encrypted_trisquel.html
@@ -309,12 +309,6 @@
Obviously, replace it with the correct hash that you actually got for the password that you entered. Meaning, not the hash that you see above!
-
- You can change the menuentry to say this:
- menuentry 'Load Operating System' --unrestricted
- This will allow booting that menuentry without a password, but not allow changing it (according to a user report).
-
-
After this, you will have a modified ROM with the menu entry for cryptomount, and the entry before that for the GRUB password. Flash the modified ROM
using this tutorial.
--
cgit v1.2.3-70-g09d2