-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm also interested in some level of detail. Are you suggesting a new attack vector, or a piggy-back off of the cold boot attack?
G - ----- Original Message ----- From: "Tim Hollebeek" <[EMAIL PROTECTED]> To: <fde@www.xml-dev.com> Sent: Monday, August 04, 2008 1:28 PM Subject: Re: [FDE] software defense for "cold boot" attack? > >> In this >> lecture, I'll explain how we could have access to the undocumented >> hibernation file. There is no need to act within 2 minutes of >> shutdown... >> READ and WRITE access to it. I'll also show how to use this file in >> defensive and also offensive cases. > > I hope you'll include the details of how you accomplish this when the > hibernation file is on the encrypted portion of the disk. That will > be the fascinating part. > > Let's keep this discussion civil. I know everyone has their own personal > agendas, but trashing other bright people's work isn't necessary. > > > _______________________________________________ > FDE mailing list > FDE@www.xml-dev.com > http://www.xml-dev.com/mailman/listinfo/fde -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) - not licensed for commercial use: www.pgp.com Charset: utf-8 wj8DBQFIl1K+SGIRT5oVahwRAtV5AJ9cSdAIOAuZeFvTAocE1pFKt2JfPACeJjp8 0uajLbR24uuEruc+0Sq7Gos= =AS/j -----END PGP SIGNATURE----- _______________________________________________ FDE mailing list FDE@www.xml-dev.com http://www.xml-dev.com/mailman/listinfo/fde