Re: Quick dm-crypt questions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/29/14 15:59, * wrote:
> If an attacker has access on that level, they can probaly just do
> a memory-freeze attack or a fire-wire attack. Remember that 
> disk encryption does not protect data while the system is running
> and has the data decrypted. 

I thought, AES NI makes cold boot attacks almost impossible because
the master key will be hold in CPU's cache and not in system RAM.

Since I read that mail thread, I'm not sure about that anymore.

Pls enlighten me ;)

-- 
-- \__________________________________________________
ingo.schmitt@xxxxxxxxxxxxxxxxx - GnuPG ID: 0xAFD687D2 |
FP: 7418 77A6 4B59 AF90 4A11 1CCE 91C9 FF1B AFD6 87D2 |
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux