Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Trusted Platform Module-Backed Full Disk Encryption Coming to Ubuntu 25.10


Canonical's upcoming release of Ubuntu 25.10 will feature a significant improvement in full disk encryption capabilities, courtesy of the Trusted Platform Module (TPM). By utilizing modern PCs' TPM 2.0 chips, users can enjoy enhanced security and peace of mind without having to enter their encryption keys during boot-up. However, this feature is currently restricted to compatible hardware running Windows 11.

  • The upcoming Ubuntu 25.10 release will include Trusted Platform Module (TPM)-backed full disk encryption.
  • This feature aims to provide an additional layer of protection for users' sensitive data by utilizing the onboard TPM 2.0 chip.
  • It eliminates the need for users to enter their encryption keys, reducing the risk of data breaches due to forgotten or lost passwords.
  • The feature requires PCs with TPM 2.0 chips and UEFI firmware with Secure Boot enabled.
  • Conical has implemented this feature using the Unified Kernel Image (UKI) system, designed by Lennart Poettering.



  • Canonical's latest update on the Trusted Platform Module (TPM)-backed full disk encryption feature for its Ubuntu distribution has shed more light on how this innovative security measure will be implemented in the upcoming 25.10 release.

    The feature, which was originally planned for 23.10 but has seen a slight delay, aims to provide an additional layer of protection for users' sensitive data by utilizing the onboard TPM 2.0 chip in modern PCs. This approach eliminates the need for users to enter their encryption keys, thereby reducing the risk of data breaches due to forgotten or lost passwords.

    In essence, this feature relies on the TPM chip's encrypted memory to store the encryption keys, allowing a signed bootloader to retrieve them during the boot process. The volume is then unlocked, and a signed kernel package is loaded. This streamlined approach minimizes user intervention, making it easier for users to enjoy enhanced security without being bogged down by tedious password entries.

    However, this feature comes with some caveats. Firstly, it requires PCs equipped with TPM 2.0 chips and UEFI firmware that has Secure Boot enabled. This restriction means that the feature is currently only available to users running Windows 11 on compatible hardware. Nevertheless, Canonical has taken steps to ensure that older systems can still access this enhanced security measure through a separate installation option.

    Canonical's implementation of full disk encryption backed by the TPM chip employs the Unified Kernel Image (UKI) system, which was designed by renowned Linux system engineer Lennart Poettering. This approach diverges from the standard Linux boot process and requires some adjustments to accommodate the new feature.

    The executive summary of this new security measure is that it provides a robust and streamlined way for users to protect their sensitive data. By utilizing the onboard TPM 2.0 chip, Canonical aims to simplify the full disk encryption process while reducing the risk of data breaches. With its implementation adopting the fashionable UKI system, this feature promises to provide users with an additional layer of protection against cyber threats.

    In conclusion, the Trusted Platform Module-backed full disk encryption feature coming to Ubuntu 25.10 represents a significant step forward in providing users with enhanced security and peace of mind. By leveraging modern PCs' TPM 2.0 chips, Canonical aims to make this innovative security measure accessible to a wider range of users while minimizing user intervention.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Trusted-Platform-Module-Backed-Full-Disk-Encryption-Coming-to-Ubuntu-2510-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2025/07/31/ubuntu_tpm_fde/


  • Published: Thu Jul 31 09:53:23 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us