The current state of full disk encryption is still not good (2025)

I gave a talk about the current state of full disk encryption at GPN23 (20.06.2025).

slides (pdf), submission, media.ccc.de, youtube

Submission / agenda

In theory, full disk encryption (FDE) just works. You just have to enable it. But in practice, cops get access to a lot of devices, even when they are encrypted.

I want to summarize the current state of full disk encryption. I will explain conceptional weaknesses/attacks, practical physical attacks (videos of live demos) and give recommendations. I will explain how TPMs work and how you can use them to increase (but also break) the security of your device.

The focus is on Linux and TPMs. I will briefly talk about the broken state of Smartphone Security and Window’s FDE Bitlocker. There is also Linux hands-on.

AGENDA
  • Motivation & Threat Model
  • Smartphone Security
  • History of cold boot attacks
  • Full disk encryption on Linux
  • TPM 2.0 (How does it work? How can I use it? Attacks, benefits and problems)
  • Windows FDE (is currently broken)
  • How I do FDE on Linux

Licensed to the public under https://creativecommons.org/licenses/by/4.0/

Resources