this post was submitted on 30 Apr 2026
54 points (98.2% liked)
Linux Gaming
25654 readers
252 users here now
Discussions and news about gaming on the GNU/Linux family of operating systems (including the Steam Deck). Potentially a $HOME away from home for disgruntled /r/linux_gaming denizens of the redditarian demesne.
This page can be subscribed to via RSS.
Original /r/linux_gaming pengwing by uoou.
No memes/shitposts/low-effort posts, please.
Resources
Help:
- ProtonDB
- Are We Anticheat Yet?
- r/linux_gaming FAQ
- Fork of an earlier version of the above
- PCGamingWiki
- LibreGameWiki
Launchers/Game Library Managers:
General:
Discord:
IRC:
Matrix:
Telegram:
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
If you have to choose between one, then yes; full disk encryption is superior. But they should ideally be used in tandem.
Without secure boot, you are vulnerable to evil maid attacks. A bad actor can modify your bootloader (which has to remain unencrypted) in a way that allows them to steal your encryption keys. Secure Boot prevents running unsigned bootloaders, which negates this risk.
If someone has access to your device enough to modify your bootloader they could also just install a hardware keylogger or hidden camera and get your password that way.
Sure, but that's much harder to do undetected. Don't let perfect be the enemy of good. Secure Boot still prevents against particular types attacks.
I get that perfect is the enemy of good, but you also need to have defined threat models. Secure boot protects against people covertly taking your ssd, putting it in their own device, overwriting the OS with one that looks identical but is a key logger, and then putting it back in your system. Yet systems with secure boot have no tooling to stop attackers from just... Putting a hardware keylogger inline with the keyboard.