Re: Fedora - Cold Boot Attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/11/2010 07:55 PM, Roman Rakus wrote:
>    On 11/08/2010 03:12 PM, Gregory Maxwell wrote:
>    
>> Here is the attack:  Your system is running with nice secure encrypted
>> drives, no console access (or a locked screen on a laptop). The
>> attacker inserts a bootable USB key and hits the power switch. System
>> reboots into the USB key, it retrieves the cryptographic keys for
>> reading your disk from memory, then copies whatever information it
>> likes.
>>      
> Only if the laptop is configured to boot from the USB. But I know,
> everything here is theoretical.
>
> RR
>    
Yes, it's theoretical; I only wanted to know if there is a protection of 
any kind already implemented.

I did a test and if i use an electric screwdriver I can get access to 
the laptop memory in eight seconds.

The next step would be a freezer spray, -50C and less, removing of DIMMs 
from the laptop and reading them.

I don't know how you, but when I am about to leave my workplace, I click 
on the button "Shut Down" and bye, bye, my computer, walking out of the 
room.

Vaclav M.




-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux