https://en.wikipedia.org/wiki/Disk_encryption_theory
Why do we use XTS over CTR for disk encryption?
If we used ChaCha20 (without authentication) by simply encrypting each disk sector with the same random key and with the block number as the nonce (no additional data), how would this break the properties of the security model outlined in the Wikipedia link above, under "Problem definition"?
The ChaCha keystream bits will be different for each plaintext block within all sectors, either because the blocks from different sectors have different nonces (the block number), or because the keystream blocks within a sector, despite having the same nonce, will be generated with different (successive) counter values.
Moreover, each sector is cryptographically tied to its location, because the nonce is the block number, so copying an encrypted sector to an unused sector and requesting its decryption (see Wikipedia link, adversary 3) will not decrypt correctly.
What am I missing here?