BreachExchange mailing list archives

OT: Encryption keys persist in RAM, after shutdown, enabling FDE bypass


From: Chris Walsh <chris () cwalsh org>
Date: Thu, 21 Feb 2008 10:54:57 -0600

Ed Felten and colleagues have a paper out which shows how full disk encryption
products, among them BitLocker, can be defeated by reading encryption keys
from RAM chips *after the machine has been powered off*.

See http://citp.princeton.edu/memory/ for more.

_______________________________________________
Dataloss Mailing List (dataloss () attrition org)
http://attrition.org/dataloss

Tenable Network Security offers data leakage and compliance monitoring
solutions for large and small networks. Scan your network and monitor your
traffic to find the data needing protection before it leaks out!
http://www.tenablesecurity.com/products/compliance.shtml


Current thread: