The boot code can then decrypt the encrypted volume on the unknown computing device without performing all of the above described steps, and, can, thereby, provide user access to the applications, operating systems or other components stored within the encrypted volume more efficiently.