On 11/08/2010 03:12 PM, Gregory Maxwell wrote: > Here is the attack: Your system is running with nice secure encrypted > drives, no console access (or a locked screen on a laptop). The > attacker inserts a bootable USB key and hits the power switch. System > reboots into the USB key, it retrieves the cryptographic keys for > reading your disk from memory, then copies whatever information it > likes. Only if the laptop is configured to boot from the USB. But I know, everything here is theoretical. RR -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel