I don't understand why anyone would use passwordless disk encryption. It just seems inherently vulnerable, especially with the threat model of physical compromise.
Entering a password on boot isn't even that much work
replies(19):
Entering a password on boot isn't even that much work
Just typing a passphrase at boot seems like a pretty decent compromise. I've done it for years and it's never caused a problem.
But all the “passwordless” schemes I’ve seen support at least an additional “master key” which you can type in.
So if you’re ok with the security tradeoffs of passwordless tpm, it’s only an added convenience on top of your approach.