Re: the cold-boot attack - a paper tiger?
|[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]|
--- Jacob Appelbaum <jacob@xxxxxxxxxxxxx> wrote: > > Because loop-aes *is* vulnerable to our attacks. > > The keying material is in memory when we mount our > attack. We were able > to reliably extract keys required to decrypt the > data on the disk. > So I am right in saying that quitting X and overwriting free memory as root with a utility such as smem after pulling down the loop will prevent key recovery? - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/