How Does Full Disk Encryption Work? 2021

How Does Full Disk Encryption Work? 2021

A lot of the talk about Disk Encryption these days centers around securing things like Internet connections and passwords on a server somewhere,

And it makes sense considering how much data is constantly being tossed around online.

But let’s say that you’ve done everything you can to hide your online activity using a VPN,

Making up a 20 character freaking password for your social media accounts, and overwriting your browser cache.

What if, despite all of this, someone just walks off with your hard drive or computer or breaks in while you’re out of the house and starts trying to get into your stuff?

This is where an equally important kind of encryption can really help you. It’s called whole drive encryption or full disk encryption.

And just like the name says, the idea is to encrypt your whole drive so a thief can’t just access all of your private data if they walk off with it.

But how does Disk Encryption work?

Many full disk encryption methods, such as Windows Bit Locker, try to give you a fairly transparent experience when you’re actually using the computer to do this.

All of the data on your drive is encrypted and the next time you boot up your computer,

You’ll be presented with a special Pre-Boot environment, that will ask you for an encryption key.

This could be something as simple as a password or a key stored on a physical drive like a USB stick.

If you’d rather go that route after you supply the appropriate credentials, your hard drive will be decrypted and you’ll be able to carry on business as usual.

Of course, if someone steals your hard drive and your encryption key isn’t terribly strong, it might not be too hard for some miscreant to crack it.

So many users who use full disk encryption add another layer of protection through a trusted platform module or TPM.

This is an add-in chip found on some motherboards.

And even if you don’t have one, many modern motherboards, including lower cost ones, have TPM headers. So you can just buy one for not a lot of money and install it yourself.

What a TPM does IN Disk Encryption?

It generates encryption keys and stores them, at least in part on the module itself instead of just the hard drive.

TPIMs can also detect tampering attempts.

So, if someone steals your hard drive out of your computer and tries to put it on their own, it won’t work.

And speaking of tampering, TPIMs can additionally tell if someone has injected malicious code like a rootkit,

Which you can learn about up here into your boot sector, which often can’t be encrypted by full drive encryption schemes.

This way it can lock down the system and help you recover it later without exposing it to rootkit malware.

Some people even take this a step farther and buy hardware encrypted drives that have a built-in chip that can encrypt the entire enchilada, including your boot sector.

This way it can lock down the system and help you recover it later without exposing it to rootkit malware.

Some people even take this a step farther and buy hardware encrypted drives that have a built-in chip that can encrypt the entire enchilada, including your boot sector.

But despite all these ways to secure your drive, they don’t really do much at all to keep your data safe once your computer is up and running.

Remember how I said it decrypts your entire drive, instead of Many people who are serious about security,

Especially if they have to leave their computers on twenty-four seven for whatever reason,

Use some sort of filesystem-level encryption that can encrypt and decrypt individual files on demand.

Very useful if you don’t want someone to randomly use your PC poring through all of your questionable downloads.

So let us know if you’d like to see a video on how to keep your files safe from prying eyes if you have to leave your window session unattended.

After all, you definitely don’t want everyone knowing it was you that created that piece of fan art. 4Chan just really can’t stop talking about it.

The End

Don’t forget to let me know in the comments down below. If you want to see a file system level encryption blog like the blog comment below,

If you liked it, disliked it, if you disliked it, don’t forget to get subscribed to TechRaspy.com

We’ve got a bunch of cool ones there. They’re interesting. I’m sure if you get bored with only coding, you can check more blogs that is more interesting.

And if you’re wondering what the hell that incessant whispering was in the background of this entire blog, say Hi, Linus.

Hello. Linus is doing the show, so I’m going to go do that now. All right.

Good Bye 🙂

Related Post:- Why Do Electronics Die – Why Stop Working?

More About Disk Encryption

Leave a Reply