Today i took my first steps into the world of Linux by creating a bookable Mint Cinamon USB stick to fuck around on without wiping or portioning my laptop drive.
I realised windows has the biggest vulnerability for the average user.
While booting off of the usb I could access all the data on my laptop without having to input a password.
After some research it appears drives need to be encrypted to prevent this, so how is this not the default case in Windows?
I’m sure there are people aware but for the laymen this is such a massive vulnerability.
Are you saying the performance hit is from running off an encrypted drive?
There will be some additional time and resources required to read and write encrypted data, even if minor.
Given that AES instructions have been implemented directly in the CPU since 2008, any performance penalty should be negligible.
Thank you for the info! I like your username.