<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: staff3203</title><link>https://news.ycombinator.com/user?id=staff3203</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 14:13:07 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=staff3203" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by staff3203 in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>What to do for a single root fs spanned over 2 encrypted partitions on 2 separate disks?</p>
]]></description><pubDate>Fri, 17 Jan 2025 19:36:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=42742348</link><dc:creator>staff3203</dc:creator><comments>https://news.ycombinator.com/item?id=42742348</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42742348</guid></item><item><title><![CDATA[New comment by staff3203 in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>On my system, I used `tpm2-measure-pcr=yes` in `/etc/crypttab.initramfs`, then used `--tpm2-pcrs=0+2+7+15:sha256=0000000000000000000000000000000000000000000000000000000000000000` with `systemd-cryptenroll`.<p>As soon as a volume is decrypted, initrd will write `volume-key` to PCR 15, so any further executables can no longer access the data stored in the TPM.</p>
]]></description><pubDate>Fri, 17 Jan 2025 05:22:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=42734355</link><dc:creator>staff3203</dc:creator><comments>https://news.ycombinator.com/item?id=42734355</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42734355</guid></item></channel></rss>