I tried added a key file and even a password txt but both lead to it still asking for me to type in the password.

Is it because the drive is encrypted? I tried placing the files at /, /boot, /root, /etc

Edit1: I’ve tried to install dropbear and give it ssh keys. I will try to reboot in the morning and see what happens

Edit2: signing in via ssh just says port 22 rejected not working :(

  • kevincox@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    8 hours ago

    Depending on the attacker of course. If they can read your RAM after auto-decrypt they can just take the encryption key.

      • kevincox@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        8 hours ago

        Only if they gain possession when the device is running with the drive decrypted and they keep it running the whole time. That is a lot higher bar then being able to turn the machine on at any time and then recover the key. For example if this is a laptop that you are flying with. Without auto-decryption you can simply turn it off and be very secure. With auto-decryption they can turn it on then extract the key from memory (not easy, but definitely possible and with auto-decryption they have as long as they need, including sending the device to whatever forensics lab is best equipped to extract the key).