How so? If you have 2 partitions encrypted separately with, say, Veracrypt, the worst thing the infected partition could do is copy the other encrypted partition. Unless I’m missing something?
You can download a copy of the encrypted partition and attempt to crack it locally.
Which depending on how deep your cascade encryption goes can require a huge amount of computation. If you’re a small business owner running a restaurant or a student, that’s plenty of security. If you’re the lawyer for a former POTUS in a history-defining trial that might decide the future of the entire planet, I hope to God you’re not relying on that encryption.
Then again it might be the same dirt that foreign intelligence already has on Trump, so maybe it doesn’t matter either way.
This can slow a hacker down, but still a bad bad bad security practice.
How so? If you have 2 partitions encrypted separately with, say, Veracrypt, the worst thing the infected partition could do is copy the other encrypted partition. Unless I’m missing something?
You can download a copy of the encrypted partition and attempt to crack it locally.
Which depending on how deep your cascade encryption goes can require a huge amount of computation. If you’re a small business owner running a restaurant or a student, that’s plenty of security. If you’re the lawyer for a former POTUS in a history-defining trial that might decide the future of the entire planet, I hope to God you’re not relying on that encryption.
Then again it might be the same dirt that foreign intelligence already has on Trump, so maybe it doesn’t matter either way.