25
5
A few days ago, a friend of mine, wanted to show me that he can use my linux even if I don't tell him my password.
He entered in GRUB, selected the recovery mode option. My first problem is that he already had access to my files (read only). He tried to do passwd but failed. Then he did some kind of remount (I guess that gave him write rights) and after that he was able to change my password.
Why is this possible? I personally see it a security issue. Where I work there are several people that use linux and neither of them have a BIOS password set or some other kind of security wall.
24Doing this does require physical access to the computer. Realistically, unless you use TrueCrypt or similar, if I have physical access to your computer, I can probably get at your data one way or another. – Zac B – 2012-10-18T14:41:52.517
10This is not specific to Linux. With physical access, you can do the same on Windows, OSX or probably any OS. One of the reasons I can see to be this way is that an admin can allways forget his password and needs a way to get in the system. – laurent – 2012-10-18T16:28:50.627
Even if you can't log on to OS installed on the hard-drive, you can just boot a liveUSB distro, and mount the files systems and read all the files. You can always encrypt your home directory though, lots of distros have an option for doing that on install. That will safeguard most data from being read. (although it won't stop it being erased) – naught101 – 2012-10-18T23:50:14.230
3With a screwdriver, this can be done to most anything... – SamB – 2012-10-19T01:33:20.303