Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] Cold Boot Attacks on Encryption Keys



Tom Metro wrote:
> The scenario is that you have strongly encrypted data on disk,
> decryption keys in memory, an OS configured so that it doesn't do
> something stupid, like write the keys to unencrypted swap space, and an
> OS hardened enough that physical access to the machine seems like the
> easier attack vector.

The problem with this scenario is that it makes no sense. If your threat 
is physical attack then why aren't you hardening your physical intrusion 
prevention? Because there's a simple (not necessarily easy, just simple) 
way for me to circumvent all of your clever switches and self-destructs 
and WDE if you don't beef up your physical security procedures.

I go after your backups.

-- 
Rich P.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org