Re: LUKS/dm-crypt vulnerable?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Aug 08, 2009 at 05:36:35PM +0200, Heinz Diehl wrote:
But what happens when the machine is powered off and stolen?
The thief wants to have my data. Can he/she use something like "stoned" to
get into the system and decrypt the harddisk contents?
To achieve this, they will have to hand it back, wait for you to type
your password to boot, then steal it again :P

Stoned is just a trojan that installs into the boot sector,
a very well done trojan, but that is.
The whole argument about stoned and truecrypt is that stoned developer
insisted truecrypt was not secure, because it did not enforce checking
of boot sector integrity.
Truecrypt developers said that was a moot point, because, if someone is
able to replace the boot sector it could well replace the code that
checks its integrity.

add a bit of hype, mix .....

L.

--
Luca Berra -- bluca@xxxxxxxxxx
        Communication Media & Services S.r.l.
 /"\
 \ /     ASCII RIBBON CAMPAIGN
  X        AGAINST HTML MAIL
 / \
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux