During the boot stage is it possible for an attacker with physical access to detect if a keyfile is used to unlock an encrypted volume? Does it yield to protest that the keyfile is lost/unknown/destroyed when in reality there is no keyfile but instead a regular non-keyfile passphrase? _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt