1
Currently I use Linux to do full disk encryption and have it setup where I can ssh into the box to remotely unlock the machine during boot, as it is a headless server. Since this doesn't seem possible with Windows, I plan on using my existing boot implementation using Linux's LUKS/dmcrypt boot sequence, but then use 'kexec' to chainload a Veracrypt Windows system partition, similar to what is discussed here:
Since I already have everything locked down using the Linux LUKS/dmcrypt boot sequence, I want to be able to load the Veracrypt Windows system partition without user intervention. Is there any way to acheive this, either by using a blank password somehow, hard coding or piping the password into the Veracrypt bootloader, or using a resuce disk image to accomplish that?
through the use of a keyfile. plus not entirely pointless depending on what your goals are. if you're merely trying to avoid prying eyes from seeing files in the clear if someone were to steal your computer, than this at the very least would discourage that – onlinespending – 2016-05-13T17:59:13.977
yes, it does. you can use an empty passphrase and keyfile, though it appears there is a restriction for system partitions. I may just have to use Bitlocker since that appears I can do unattended boot with the use of a keyfile. Don't be so fixated on the mention of a blank password when that's not the heart of the question, nor was it ever intended to be a solution without the use of a keyfile. – onlinespending – 2016-05-13T18:10:32.037
the idea is that the keyfile would be stored remotely or on a usb drive. and yes, Bitlocker does allow you to do this. They even allow you to only store the key in the TPM – onlinespending – 2016-05-13T18:17:25.180