Ralf Ertzinger wrote:
Hi.
On Tue, 25 Mar 2008 02:38:38 -0700, Andrew Farris wrote:
You're probably right about that, but they should be relevant. If a
machine containing my information is lost/stolen I do not care
whether the company thinks their encryption on it was *probably* good
enough, I should be notified the information is out of their control.
First of all company's should never allow *employees* to leave with
security/corporate sensitive data from the premise's in the first place.
Be it on encrypted
or not laptop's or any portable media format.
( But then again they should not be mailing them either :) )
Second of all if the company is <sarcasm>*smart*<sarcasm> enough to allow
laptop or other portable media that contains security/corporate
sensitive data leave
the premise's in the first place and then when that *data* gets
*misplaced*, all parties involved
should be notified that the *information* is lost immediately.
Time is of the essence here..
In reality the scenario is more like this..
John Doe loses or *misplaces* the sensitive data, ( or is asked to mail it )
wastes couple of hours looking for
( or the people at the post office )
it and then finally reports the lost *data*, that is if he does not
report it the following morning
or he realizes that he's ( probably ) gonna get fired
( yep him not the CEO/Goverment employee that allowed this to leave the
premises in the first place )
and wastes more hours reflecting on his current situation.
( Depends on which sector your working in if you get trained to handle
these situation )
The report gets in what happens now...
Damage control meetings yea!!! let's waste more time on that..
Then couple of days ( if lucky, more likely week or more )
Parties/Clients/Public is notified of the data loss and the person that
lost the data got fired and they are assured
the data was "encrypted" and "unaccessible " by any means known to man,
and if so *unlikely* the data is in the hands of
a criminal then that criminal is made out to be a common thief and or a
drug user finding ways to finance his next fix
(something "low crime" people can commonly relate to instead of the
actual real threat )..
This has given the attacker more than enough time to execute the second
stage of his attack and or disappear..
Even assuming the memory-pull-attack is technically feasible and workable
under non-lab conditions
It it's.
I (as an attacker) would rather go against weak
passwords or use trojans to get your secret data.
I don't think that
throwing all our resources on this specific attack is a good use of
our time
I think there are others protecting their asset(s) that are working on
finding a solution
to this problem and if/when they manage to come up with one i'm sure it
will find it's
way to the open source community....
All I was suggesting that where you "hash" encrypt in anaconda there
would be a notification
telling the user(s) that thou he encrypted the drive it would be
vulnerable to "cold boot" attack.
something along with line it's better to encrypt but it's not secure
even thou governments and corporates have claimed it to be.
No need to be promoting false security..
Best regards
Johann B.
begin:vcard
fn:Johann B. Gudmundsson
n:Gudmundsson;Johann B.
org:Reiknistofnun - University of Iceland;IT Management
adr:Dunhagi 5;;Taeknigardur;Reykavik;;107;Iceland
email;internet:johannbg@xxxxx
title:Unix System Engineer RHCE,CCSA
tel;work:+3545254267
tel;fax:+3545528801
tel;pager:N/A
tel;home:N/A
tel;cell:N/A
url:http://www.rhi.hi.is
version:2.1
end:vcard
--
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list