Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On November 8, 2013 at 10:05 PM Tom Metro <tmetro+blu at gmail.com> wrote: > Bill Bogstad wrote: > > Cold Boot Attacks on Encryption Keys > But then the scenario starts to get a bit more far fetched. The people > seizing your server apparently already know or suspect you are using > full disk encryption, and your data is valuable enough to warrant > bringing in people skilled enough to hot jumper your machine to a > portable power source before moving it back to a lab where the RAM can > be frozen and dumped. Pity they didn't know about the IP over powerline (or some more subtle implementation) that trips the dead man's switch when the AC from the wall is disconnected :-) peter
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |