Ehhh I would disagree with even this conceptually. If I’ve truly compromised the OS even in BFU I can just set up a keylogger to wait for you to unlock your device and then come back and access your data later with the recorded credential.
In practice that might be overly complex to pull off, but again in theory at least encryption isn’t protecting against the exploits itself and isn’t particularly useful when used on an otherwise highly vulnerable device.
On Android, it works differently. EDS is an additional layer of protection, but only for data sets, not for the entire operating system.
Now, when it comes to Windows or Linux, we can talk about full encryption or encryption only for data sets.
Let’s assume that a Windows 11 system is fully encrypted with VeraCrypt, the chosen encryption is strong, and the password is also strong (numbers, letters, uppercase, lowercase, symbols) and is 32 characters long, for example. How could you possibly bypass this protection? You only have two options: 1. brute force 2. exploit against encryption software.
Let’s be realistic, in most cases it all depends on the encryption and the password chosen.
Easy: If you are entirely relying on the encryption because you are under the false belief it makes your device impenetrable, and you thus neglect the rest of the device’s security, I could simply remove the disk, overwrite the device’s bootloader with a bootkit, put the disk back, and wait for you to unlock your encrypted OS or data partition.
It doesn’t work like that. Try VeraCrypt sometime to see how it works. You can do whatever you want with the boot manager, but you will never be able to access the operating system or its data.
I don’t know what else to tell you other than it absolutely does work like that if you don’t have further boot protections in place like Secure Boot, which has nothing to do with the disk encryption inherently. I think you feel you have an understanding of this subject but I recommend you do a bit more reading because you’ve only scratched the surface if that’s your understanding of things. It seems you have an interest in the topic and I think you are doing yourself a disservice to assume you have all the answers already, so I do hope you heed that advice.
Encryption will protect the confidentiality and integrity of your data at rest. That’s all. It does not make your OS more secure against exploits, and it certainly doesn’t make your device impenetrable.
Of course, I don’t know everything, I only know a little about the encryption tools I mentioned.
Right now, I don’t know of a method to bypass VeraCrypt’s protection, but a local attacker with a lot of time on their hands could try things, of course. Perhaps I went too far in saying that the device would be impenetrable.
Can someone confirm that this was legitimate? I do not know who rogueFed is. What are the epistemic standards for leaks like this, or in general? I am not familiar with the discourse.