Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 24 Feb 2008 17:03:17 +0100 (CET)
From:      Christopher Arnold <chris@arnold.se>
To:        hackers@freebsd.org
Subject:   Re: Security Flaw in Popular Disk Encryption Technologies
Message-ID:  <20080224165956.X34646@localhost>
In-Reply-To: <20080224100924.c8e08776.wmoran@collaborativefusion.com>
References:  <47C06E1F.5020308@thedarkside.nl> <760775.85636.qm@web50306.mail.re2.yahoo.com> <20080223203316.GC38485@lor.one-eyed-alien.net> <a2b6592c0802231328y73da9605ybd3f5353ee32aa01@mail.gmail.com> <20080224100924.c8e08776.wmoran@collaborativefusion.com>

next in thread | previous in thread | raw e-mail | index | archive | help


On Sun, 24 Feb 2008, Bill Moran wrote:

> Or laptop vendors could make "secure" laptops that always lose memory
> on shutdown.
>
That dosn't really change anything, just don't shutdown the laptop.

Cut an opening in the case and attach a probe to monitor memory access and 
wait for the key being accessed.


 	/Chris


--
http://www.arnold.se/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080224165956.X34646>