[10:00] <revolutionary> hello again :) good morning :)
[10:15] <theodotos[m]> Oh, hi.
[10:33] <revolutionary> May i ask did you read my project?
[10:59] <theodotos[m]> Did you try the link I send you?
[17:48] <revolutionary> hi :)
[20:20] <theodotos[m]> Hi revolutionary 
[20:34] <revolutionary>  how are you?
[21:33] <theodotos[m]> I'm fine how are you?
[21:34] <theodotos[m]> Any luck?
[21:35] <theodotos[m]>  * I'm fine, how are you?
[21:35] <revolutionary> i am fine too
[21:35] <revolutionary> no luck. i am waiting a reply from you :)
[21:39] <theodotos[m]> I told you, I never did /boot encryption. So I can't help much. Did you try applying the guide you found for Ubuntu on Debian?
[21:40] <theodotos[m]> Or the other one that decrypts the /boot partition via GRUB?
[21:55] <revolutionary> yes. that installation is creating detached header key in a USB drive and also it is installing /boot partition on USB drive. No one can open that computer without that USB drive. It is a good setup
[21:56] <revolutionary> I am using that now on Ubuntu
[21:57] <revolutionary> i recommend if you care about security/privacy. i am an encryption/privacy enthusiast
[22:02] <revolutionary> if you make FDE on your Ubuntu you should do that setup. You know no one is making that setup because they are supposing they are making FDE but they are not. FDE means encrypt whole disk and whole disk's meaning includes /boot partition.
[22:10] <theodotos[m]> How about Debian? 
[22:41] <revolutionary> i can't test this setup on Debian because my computer is not for installing virtual machine and i have no second computer for this project. if you have enough infrastructure can you try?