funsec mailing list archives
Re: RIP: Full disk encryption?
From: Lubomir Kundrak <lkundrak () redhat com>
Date: Fri, 22 Feb 2008 15:38:17 +0100
On Fri, 2008-02-22 at 08:29 -0500, Richard M. Smith wrote: ...
The move, which cannot be carried out remotely, exploits a little-known vulnerability of the dynamic random access, or DRAM, chip. Those chips temporarily hold data, including the keys to modern data-scrambling algorithms. When the computer’s electrical power is shut off, the data, including the keys, is supposed to disappear.
I heard that before, but thought it is a hoax considering the fact DRAM cells are being refreshed quite often (every 64ms?). Anyone tried that? -- Lubomir Kundrak (Red Hat Security Response Team) _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- RIP: Full disk encryption? Richard M. Smith (Feb 22)
- Re: RIP: Full disk encryption? Lubomir Kundrak (Feb 22)
- Re: RIP: Full disk encryption? der Mouse (Feb 22)
- Re: RIP: Full disk encryption? mark seiden-via mac (Mar 13)
- <Possible follow-ups>
- Re: RIP: Full disk encryption? Juha-Matti Laurio (Feb 22)
- Re: RIP: Full disk encryption? Lubomir Kundrak (Feb 22)