A hacker’s clever use of Linux’s boot environment allows remote unlocking of encrypted hard drives—but it comes with serious security trade-offs. Here’s how it works, and what you need to know.
#Remote unlocking | #Encrypted drives | #Linux servers