Hello, is there a solution for a bootloader to exist on an external USB stick only, and not on the system hard drive?
I want to accomplish these things:
Full disk encryption without any trace of any bootloaders or anything that can prove that the disk is encrypted.
The OS which is installed on the system disk must be bootable only with the USB stick inserted (because it has the bootloader), otherwise the computer must show „operating system not found“ or something similar when there is no bootloader found to start booting from.
Any ideas on how could I do this currently? I have tried to simply copy the first 31 744 bytes from the encrypted hard drive (containing the bootloader) to the USB stick, after that I just filled them with zeroes, and tried booting from my USB stick containing those first 31 744 bytes, I entered correct password, but it said that it is incorrect. I am not sure why, maybe it tried booting from the USB stick, and not the system SSD? What can I do to accomplish my idea?
I just want for the system SSD disk to look as if the flash chips have crashed with random data, without any proof that it was encrypted or anything. Because right now, having a bootloader at the start that just screams in plain ascii „VeraCrypt Boot Loader“ on a system disk is a dead giveaway even for an inexperienced person.
Thank you,
👍
1
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Wow, I signed up for this because I had the exact same query. Everything I searched merely talks about removing boot laoder in conjunction with removing Veracrypt/decrypting data perminantly.
At least for the second point, isn't that the whole point of the recovery iso? Boot from USB
(or CD) , load boot loader from that, type in password and your off.
Specifically my question was about your first point. How do you remove any trace of the boot loader so that if just looks like a hard drive with random data. A hard drive with garbage/corrupt data is far more believable than one with a boot loader that pops up looking for a password.
👍
1
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Hello, is there a solution for a bootloader to exist on an external USB stick only, and not on the system hard drive?
I want to accomplish these things:
Any ideas on how could I do this currently? I have tried to simply copy the first 31 744 bytes from the encrypted hard drive (containing the bootloader) to the USB stick, after that I just filled them with zeroes, and tried booting from my USB stick containing those first 31 744 bytes, I entered correct password, but it said that it is incorrect. I am not sure why, maybe it tried booting from the USB stick, and not the system SSD? What can I do to accomplish my idea?
I just want for the system SSD disk to look as if the flash chips have crashed with random data, without any proof that it was encrypted or anything. Because right now, having a bootloader at the start that just screams in plain ascii „VeraCrypt Boot Loader“ on a system disk is a dead giveaway even for an inexperienced person.
Thank you,
Wow, I signed up for this because I had the exact same query. Everything I searched merely talks about removing boot laoder in conjunction with removing Veracrypt/decrypting data perminantly.
At least for the second point, isn't that the whole point of the recovery iso? Boot from USB
(or CD) , load boot loader from that, type in password and your off.
Specifically my question was about your first point. How do you remove any trace of the boot loader so that if just looks like a hard drive with random data. A hard drive with garbage/corrupt data is far more believable than one with a boot loader that pops up looking for a password.