FDE vs Unencrypted Security After Decrypting

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite












Is there any security difference between an unencrypted, password-protected computer and an encrypted, password-protected computer after the hard drive is decrypted? Assume that the laptop has an infinite power supply.









share







New contributor




Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.



















  • If the hard disk is pulled out and the rest of the computer is discarded, the encrypted drive is the still encrypted.
    – sebasth
    1 min ago














up vote
0
down vote

favorite












Is there any security difference between an unencrypted, password-protected computer and an encrypted, password-protected computer after the hard drive is decrypted? Assume that the laptop has an infinite power supply.









share







New contributor




Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.



















  • If the hard disk is pulled out and the rest of the computer is discarded, the encrypted drive is the still encrypted.
    – sebasth
    1 min ago












up vote
0
down vote

favorite









up vote
0
down vote

favorite











Is there any security difference between an unencrypted, password-protected computer and an encrypted, password-protected computer after the hard drive is decrypted? Assume that the laptop has an infinite power supply.









share







New contributor




Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











Is there any security difference between an unencrypted, password-protected computer and an encrypted, password-protected computer after the hard drive is decrypted? Assume that the laptop has an infinite power supply.







linux security





share







New contributor




Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.










share







New contributor




Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.








share



share






New contributor




Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked 4 mins ago









Cain

1




1




New contributor




Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Cain is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











  • If the hard disk is pulled out and the rest of the computer is discarded, the encrypted drive is the still encrypted.
    – sebasth
    1 min ago
















  • If the hard disk is pulled out and the rest of the computer is discarded, the encrypted drive is the still encrypted.
    – sebasth
    1 min ago















If the hard disk is pulled out and the rest of the computer is discarded, the encrypted drive is the still encrypted.
– sebasth
1 min ago




If the hard disk is pulled out and the rest of the computer is discarded, the encrypted drive is the still encrypted.
– sebasth
1 min ago















active

oldest

votes











Your Answer







StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: false,
noModals: false,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);






Cain is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f474729%2ffde-vs-unencrypted-security-after-decrypting%23new-answer', 'question_page');

);

Post as a guest



































active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes








Cain is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















Cain is a new contributor. Be nice, and check out our Code of Conduct.












Cain is a new contributor. Be nice, and check out our Code of Conduct.











Cain is a new contributor. Be nice, and check out our Code of Conduct.













 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f474729%2ffde-vs-unencrypted-security-after-decrypting%23new-answer', 'question_page');

);

Post as a guest













































































Popular posts from this blog

How to check contact read email or not when send email to Individual?

Bahrain

Postfix configuration issue with fips on centos 7; mailgun relay