Re: the cold-boot attack - a paper tiger?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- Jacob Appelbaum <jacob@xxxxxxxxxxxxx> wrote:
> 
> Because loop-aes *is* vulnerable to our attacks.
> 
> The keying material is in memory when we mount our
> attack. We were able
> to reliably extract keys required to decrypt the
> data on the disk.
> 

So I am right in saying that quitting X and
overwriting  free memory as root with a utility such
as smem after pulling down the loop will prevent key
recovery?



      

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux