Thursday, May 2, 2024
 Popular · Latest · Hot · Upcoming
2
rated 0 times [  2] [ 0]  / answers: 1 / hits: 1266  / 2 Years ago, tue, november 30, 2021, 1:52:22

I have dual-boot with windows 7 and ubuntu.




  • /dev/sda1 ext4 (/boot)


  • /dev/sda2 ntfs (windows partition)


  • /dev/sda5 ext4 (root encrypted)




I don't have any concern of adversaries gaining physical access to my laptop and installing keylogger on unencrypted /boot partition.



But my concern is that if my windows 7 is compromised by adversary could they(Without Physical access):




  1. Enable windows to recognise ext4 boot partition and install keylogger there to record paraphrase on next ubuntu boot.

  2. Read paraphrase collected by keylogger on next windows boot.

  3. use that paraphrase to unlock linux root partition from windows, and replace original kernel.



Or am I being paranoid?



I m linux newbie, and very concerned about privacy. Please help.


More From » boot

 Answers
2

Yes, in theory an attacker can install a modified kernel with a keylogger to your /boot partition.



If you are worried about this you might want to run Windows in a virtual machine rather than dual boot.


[#29297] Wednesday, December 1, 2021, 2 Years  [reply] [flag answer]
Only authorized users can answer the question. Please sign in first, or register a free account.
enytidge

Total Points: 169
Total Questions: 105
Total Answers: 107

Location: Papua New Guinea
Member since Tue, Aug 24, 2021
3 Years ago
enytidge questions
Tue, Feb 28, 23, 15:26, 1 Year ago
Sun, Jan 1, 23, 19:36, 1 Year ago
Sun, Oct 24, 21, 07:30, 3 Years ago
Wed, Nov 9, 22, 22:02, 2 Years ago
;