[Discuss] Cold Boot Attacks on Encryption Keys

Richard Pieri richard.pieri at gmail.com
Fri Nov 8 22:36:25 EST 2013


Tom Metro wrote:
> The scenario is that you have strongly encrypted data on disk,
> decryption keys in memory, an OS configured so that it doesn't do
> something stupid, like write the keys to unencrypted swap space, and an
> OS hardened enough that physical access to the machine seems like the
> easier attack vector.

The problem with this scenario is that it makes no sense. If your threat 
is physical attack then why aren't you hardening your physical intrusion 
prevention? Because there's a simple (not necessarily easy, just simple) 
way for me to circumvent all of your clever switches and self-destructs 
and WDE if you don't beef up your physical security procedures.

I go after your backups.

-- 
Rich P.



More information about the Discuss mailing list