this doesn't facilitate any attacks, until proven otherwise.

please note that during installation, there is no valuable data on disk
anyway, or in other words, all data written can be pre-calculated as the
predictable copy of the squashfs is done.

please demonstrate how you can recover encryption key based on the just
installed, yet otherwise untouched, machine.

** Summary changed:

- Ubiquity facilitate attack on crypto LUKS
+ Ubiquity uses /dev/null when setting up encrypted swap

** Changed in: ubiquity (Ubuntu)
       Status: Triaged => Opinion

** Changed in: user-setup (Ubuntu)
       Status: Triaged => Opinion

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1506995

Title:
  Ubiquity uses /dev/null when setting up encrypted swap

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1506995/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to