Conversation

There should have been no way to get to that situation without: 1. Being offered the option to use the passphrase as input to a KDF, with warning about strength. 2. Being warned to store key backup on paper, and that data WILL BE GONE PERMANENTLY if you don't.
1
3
Replying to
They do use a KDF but only use the resulting key to encrypt the header. It's the approach used by most disk encryption implementations in order to allow the user to rotate the password without having to encrypt the whole drive again, only the header. Easy to make that atomic too.
2
1
Replying to
Sure, but the user wanting to change their passphrase is different than them wanting to rotate the underlying disk encryption key. It could require a lot of time and storage space or simply backing up, resetting and restoring from the backup.
2
Replying to and
It's also worth noting that some devices have an SoC key wrapping feature where the OS can choose to provide the encrypted key and key derivation inputs for the key encryption to the SoC encryption module without ever being able to see the decrypted disk encryption key itself.
1
Replying to and
That's how it works on iPhones. Snapdragon has a similar hardware feature and AOSP supports it but it's not actually used on the reference devices (Pixels) probably because they prefer being able to verify that the inline encryption support is actually working as intended.
1
Replying to and
Even though you're setting disk encryption keys in hardware registers used to do inline decryption/encryption, you can normally check that it's working as intended by comparing the results in both directions with software. If you use the wrapped key protection, you can't do that.
1
Replying to and
i.e. wrapped key protection is kind of neat but it's hard to see substantial value from it. Rotating the actual encryption key provides comparable security properties, but it's a lot of trouble. It's important that encryption is standard and always enabled so it needs usability.
1
Replying to
And it needs to not compromise data recovery capability. For vast majority of users, availability is more important than confidentiality. If you break it, users will hate encryption.
1