Just kidding, I love them both. Nevertheless, I've encountered somewhat curious TC-related problem. My laptop setup: multiboot system with previously peacefully co-existing Windows 7 and Wheezy. By pressing the ESC-button, TC-bootloader passed the turn to LUKS-enhanced linux system. This kind of configuration required a "forcefull" suggestion to grub2 during the installation and some extra tweaking, but it worked fine for several years. However, the recent Debian patch seems to have replaced the TC-bootloader with grub2 and I was like: Sweet Jesus and Lucifer. What next?
So, grub2 ignored totally the windows partition (applauds from Torvalds, I'd presume), but this was not a total loss. I logged into my work-serious OS and then installed the *nix-version of TC -> partition mount and decrypt (with extra option included). Boom! To my surprise, it worked like a whim despite the TC mismatch/reluctance with linux system encryption. All hails to the original TC developers who (assuming they're not spooks) allowed me to recover important data from the non-functioning leasure-OS. Such as legacy game character saves, twi'lek pron, and that kind of stuff.
But seriously, this cross-platform functionality and ease-of-use raises eyebrows a bit. Either the mysterious TC programmer(s) was(were) extremely pleasing-the-public tech-savvy or had some serious TLA backup. Despite my personal paranoid quirks, I'd presume that the TC crypto is good (in the complexity class sense) due to the validation by Matthew Green's team. This time the devil isn't in the detail but in "insiderchannel" attacks, i.e., more pervasive ways to attack ones privacy. Why resort to integer defactoring with blazing-hot multitude of quantum processors (double contradiction pun intended) if you have an easier access (keyloggers, firmware-level exploits, etc.) to the private keys? Of course, the TLAs have always a human decision to justify the threat priority instead of blind automation targeting encryption. Right? Right? Oh well... sigh
Um, I might also have some research associates connected with the non-US defence industry. Is that why they (i.e., spooks) want to feed a webcam image of my ass into the Utah data mining mayhem?
OK, despite this rant I'd hope for an educated guess from the contributors of this blog. What will happen if I replace MBR grub2 with the TC rescue disk bootloader? Will the bootloader find also the Linux-partition? A total starting-from-the-scratch installation is also an option (since I can backup everything), but that process is more tedious - thanks to the proprietary software. And I'm scared to change the current LaTex setup since it may damage the layout of my thesis-to-be...
P.S. Plz, I'm also requesting for a detailed OS-specific tutorial to harden my computer against unauthorized (intercontinental civil rights violation or universal computer criminal) access. Other than moving into a cave and eating rodents.
P.P.S. My full support to the TC and Veracrypt teams. If I were a rich man, you'd be too.