I have dual-boot with windows 7 and ubuntu.
/dev/sda1
ext4 (/boot
)/dev/sda2
ntfs (windows partition)/dev/sda5
ext4 (root encrypted)
I don't have any concern of adversaries gaining physical access to my laptop and installing keylogger on unencrypted /boot partition.
But my concern is that if my windows 7 is compromised by adversary could they(Without Physical access):
- Enable windows to recognise ext4 boot partition and install keylogger there to record paraphrase on next ubuntu boot.
- Read paraphrase collected by keylogger on next windows boot.
- use that paraphrase to unlock linux root partition from windows, and replace original kernel.
Or am I being paranoid?
I m linux newbie, and very concerned about privacy. Please help.
Yes, in theory an attacker can install a modified kernel with a keylogger to your /boot partition.
If you are worried about this you might want to run Windows in a virtual machine rather than dual boot.
No comments:
Post a Comment