Encryption is security at rest. An encrypted drive on a system that isn’t backdoored cannot be accessed no matter what tricks you have in store because you can’t read its storage even insofar as booting it up. It’s literally mathematically impossible insofar as it requires more cpu power than exists to guess the key required to decrypt the drive. In order to use the Linux exploits you must get the target to enter the encryption passphrase and run your malware.
What you are complaining of is weak interior doors that don’t provide much additional help if a crew of armed thugs break down your secure exterior door.and get by your armed guard.
The MS exploit is a key to your house hidden under the welcome mat with a post it note with the combo to your safe. It appears to have been deliberately put their by MS to help the government hack your machine if you ever did anything naughty but now means that every corporate machine in the last several years that was swiped or lost which was believed to be secured is now an open question as far as what data on it may yet be gleaned and by whom.
Encryption is security at rest. An encrypted drive on a system that isn’t backdoored cannot be accessed no matter what tricks you have in store because you can’t read its storage even insofar as booting it up. It’s literally mathematically impossible insofar as it requires more cpu power than exists to guess the key required to decrypt the drive. In order to use the Linux exploits you must get the target to enter the encryption passphrase and run your malware.
What you are complaining of is weak interior doors that don’t provide much additional help if a crew of armed thugs break down your secure exterior door.and get by your armed guard.
The MS exploit is a key to your house hidden under the welcome mat with a post it note with the combo to your safe. It appears to have been deliberately put their by MS to help the government hack your machine if you ever did anything naughty but now means that every corporate machine in the last several years that was swiped or lost which was believed to be secured is now an open question as far as what data on it may yet be gleaned and by whom.