I recently acquired a new computer so I decided to try a few things, such as disk-encryption (fir the record, I installed Ubuntu 15.10, made only one partition, wiping everything that was here).
I ran across the problem that the random password I chose contains the letter A, and some other chars that aren't on the same place when we compare QWERTY and AZERTY keyboards.
So I started to wonder if it is possible to config the keyboard in AZERTY mode before having the prompt for disk-decryption, and this led me to think about where would this configuration be located? I mean, since I only have one partition, this have to be encrypted, therefore, I can't change the configuration. But, the decryption password has to be stored somewhere as well, even if it's hashed...
So my questions are:
- Where on the drive (assuming it's on the drive) are located the decryption password hash, the config file for the keyboard (if such thing is possible)
- This has to be on an unencrypted part of the drive, so it means that not the whole disk is encrypted, or did I get something wrong?
- To what extend data mentioned in question 1 can be retrieved and therefore help an attacker deduce my password? (because it seems legit that my password contains some letter that are on different places on QWERTY/AZERTY keyboards, as no one would bother switch modes if the decryption password doesn't contain such letters)
- What are the data that are accessible when drive is encrypted?
Thanks