Date: Sun, 24 Feb 2008 17:03:17 +0100 (CET) From: Christopher Arnold <chris@arnold.se> To: hackers@freebsd.org Subject: Re: Security Flaw in Popular Disk Encryption Technologies Message-ID: <20080224165956.X34646@localhost> In-Reply-To: <20080224100924.c8e08776.wmoran@collaborativefusion.com> References: <47C06E1F.5020308@thedarkside.nl> <760775.85636.qm@web50306.mail.re2.yahoo.com> <20080223203316.GC38485@lor.one-eyed-alien.net> <a2b6592c0802231328y73da9605ybd3f5353ee32aa01@mail.gmail.com> <20080224100924.c8e08776.wmoran@collaborativefusion.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 24 Feb 2008, Bill Moran wrote: > Or laptop vendors could make "secure" laptops that always lose memory > on shutdown. > That dosn't really change anything, just don't shutdown the laptop. Cut an opening in the case and attach a probe to monitor memory access and wait for the key being accessed. /Chris -- http://www.arnold.se/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080224165956.X34646>