Date: Fri, 10 Aug 2018 16:08:01 +0200 From: cpghost <cpghost@cordula.ws> To: freebsd-questions@freebsd.org Subject: Re: Erase memory on shutdown Message-ID: <faff1533-41c9-63a1-1c66-45c194cae140@cordula.ws> In-Reply-To: <63033.108.68.162.197.1533484522.squirrel@cosmo.uchicago.edu> References: <20180805150241.1E186200349F8E@ary.qy> <4e70e969-14f7-c65d-96d2-dd1610499cd0@irk.ru> <63033.108.68.162.197.1533484522.squirrel@cosmo.uchicago.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On 08/05/18 17:55, Valeri Galtsev wrote: > Another route could be encryption of RAM on-the-fly while system runs, yet > it is questionable where the encryption key itself is kept to be > unaccessible for the attacker in the attack above, and boot of such system > may require warm body present. What about SEV? https://developer.amd.com/amd-secure-memory-encryption-sme-amd-secure-encrypted-virtualization-sev/ https://github.com/AMDESE/AMDSEV > Valeri -cpghost. [-- Attachment #2 --] 0 *H 010 `He 0 *H 000 /A| *60 *H 010 UGB10UGreater Manchester10USalford10U COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA0 171220000000Z 181220235959Z0#1!0 *H cpghost@cordula.ws0"0 *H 0 Wqor\Mq!%`CN5e;F_.:,θ|@GkbB1[,n@A8_<R[J+Vcy>| t`7(>8+0QhVE-8TOڪIKǞ(7 MΞ;+H (y$e>dDӹFGyK+dϜB 00U#0la|=+qH^ċ0U%Papo_@['6 0U0U0 0 U%0++10 `HB 0FU ?0=0;+10+0)+https://secure.comodo.net/CPS0ZUS0Q0OMKIhttp://crl.comodoca.com/COMODORSAClientAuthenticationandSecureEmailCA.crl0+0}0U+0Ihttp://crt.comodoca.com/COMODORSAClientAuthenticationandSecureEmailCA.crt0$+0http://ocsp.comodoca.com0U0cpghost@cordula.ws0 *H tW)T(tHCOCD3,bͳI^+TqA.VMuHلv%@ 9N+>/ž]h(SGN[q-6B-;MmAP^0E^g_D8(J%':.jwǥ@ D-Ƽ@]-Eia[)b Ȼvӟ7~پ>M00Πj8;+kٸRV0 *H 010 UGB10UGreater Manchester10USalford10U COMODO CA Limited1+0)U"COMODO RSA Certification Authority0 130110000000Z 280109235959Z010 UGB10UGreater Manchester10USalford10U COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA0"0 *H 0 W(vu@8v!P%yL}:X>1.4vلj=4HK hyt4z|e`'"2@rF5P3*UT+%4D5+ ZSu+=7F_Zte >) 94Fro8pNhFF#Ne6/M{UWֱmAYT"o)CI m84$.zW4 r^M9,R$ <080U#0~=<8220Ula|=+qH^ċ0U0U0 0U 00U 0LUE0C0A?=;http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q+e0c0;+0/http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$+0http://ocsp.comodoca.com0 *H x\(4O<_VΟV쏢kI/5@qB!fk&kn{hJd| q[Lǿᓬ?"@fCOݐrXurJH5;#68jle) )Y4Nezyq{: kx%iچ:w#f6HLP~jo9KXnM#:!!69i\}^M;TSX7 ̯3]Tc6O$voX*5!4.aKE8HIĹ7?Ar}r# R/h<סnuy<1 3mɔv#~&pvg' skMH#/ƨ$/uXqTu(|^-vM҆NKX7fA\X5sh2qP\YǟENRarpGtZp_"k7DdJVGz18040010 UGB10UGreater Manchester10USalford10U COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA /A| *60 `He [0 *H 1 *H 0 *H 1 180810140801Z0/ *H 1" ^TDs U<"$$0l *H 1_0]0 `He*0 `He0 *H 0*H 0 *H @0+0 *H (0 +710010 UGB10UGreater Manchester10USalford10U COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA /A| *60*H 1010 UGB10UGreater Manchester10USalford10U COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA /A| *60 *H (h7s5.=m,5끷U=oPa\`*?m%#,]B38hy>D\Ibq%DS_+d_ZqlrDHbXmlڹlh;8"o WMVAq1yܢH:2;8f%CQS9}eMH 9t*i 7X[и%4W hDj# W@̆Wq[.<NH]߹eh ,
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?faff1533-41c9-63a1-1c66-45c194cae140>
