Hacker News new | past | comments | ask | show | jobs | submit login

Unlocking encrypted disk isn't I/O bound though.

The key derivation step is designed to take a set amount of CPU time (say, a second), so it's difficult to brute force.




Indeed, it ought to take time to afford protection. Optimizing the rest may be fun, but already changes little in a laptop.

(A cloud instance with a disk without encryption is a different business.)




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: