On 10/29/14 15:59, * wrote: > If an attacker has access on that level, they can probaly just do > a memory-freeze attack or a fire-wire attack. Remember that > disk encryption does not protect data while the system is running > and has the data decrypted. I thought, AES NI makes cold boot attacks almost impossible because the master key will be hold in CPU's cache and not in system RAM. Since I read that mail thread, I'm not sure about that anymore. Pls enlighten me ;) -- -- \__________________________________________________ ingo.schmitt@xxxxxxxxxxxxxxxxx - GnuPG ID: 0xAFD687D2 | FP: 7418 77A6 4B59 AF90 4A11 1CCE 91C9 FF1B AFD6 87D2 | _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt