Good question! Since you didn't get an answer I've asked chatgpt, here is the answer:
If you don't encrypt
Volume 1 (100MB, typically the EFI System Partition or Boot Partition) when using
DiskCryptor, your system still asks for a password at boot because your main partition (C

is encrypted. However, there are some risks and disadvantages to leaving it unencrypted:
Why Encrypt Volume 1?
- Protection Against Attackers Bypassing Encryption
- The unencrypted boot partition contains Windows Boot Manager and related files.
- An attacker with physical access could modify the bootloader or replace it with a malicious one (e.g., a keylogger to capture your password).
- Encrypting this partition prevents such tampering.
- Full Disk Encryption (FDE) Best Practices
- Encrypting all critical partitions ensures no unprotected entry points into the system.
- This prevents attackers from booting alternative software to manipulate the boot process.
- Prevention of Offline Attacks
- If Volume 1 is unencrypted, someone could boot into a Live USB and alter files on the boot partition without your knowledge.
- This could compromise security before the DiskCryptor password prompt even appears.
What Happens If You Don't Encrypt It?
- The system will still boot and ask for your password (because C: is encrypted).
- But attackers could modify the bootloader without your knowledge.
- Your system could be tricked into leaking your encryption password or loading modified software at boot.
Conclusion: Should You Encrypt It?
Yes, you should encrypt Volume 1. While your system works without doing so, leaving the boot partition unencrypted exposes a potential security risk. If you're serious about encryption and security, it's best to encrypt it as well.