Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] Cold Boot Attacks on Encryption Keys



On November 8, 2013 at 10:05 PM Tom Metro <tmetro+blu at gmail.com> wrote:
> Bill Bogstad wrote:
> > Cold Boot Attacks on Encryption Keys

> But then the scenario starts to get a bit more far fetched. The people
> seizing your server apparently already know or suspect you are using
> full disk encryption, and your data is valuable enough to warrant
> bringing in people skilled enough to hot jumper your machine to a
> portable power source before moving it back to a lab where the RAM can
> be frozen and dumped.

Pity they didn't know about the IP over powerline (or some more subtle
implementation) that trips the dead man's switch when the AC from the wall is
disconnected :-)

peter



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org