Re: encrypted root: prevent / detect tampering with kernel / initrd

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Heinz Diehl wrote:
On 29.12.2009, Arno Wagner wrote:
I don't agree. But you have to think outside of the box and use a
separate, uncompromised boot medium that the attacker did not have
access to.

Sorry, but I can't see how this would help. The attacker installs a
hardware keylogger and just doesn't care.

I don't see the averae script kiddie install a hardware keylogger in a modern laptop.

If you have an intelligence agency after you you're screwed anyway. They'll use a tempest attack or something so you won't even notice that you gave them your password (I don't have a tempest proof room in my house, perhaps other people have?).

So it's a matter of security management. For highly confidential data you need ($$$) a tempest proof environment with armed guards. For only slightly sensitive data, simple disk encryption and some measures against script kiddies are usually enough.

Olivier
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux