-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm also interested in some level of detail. Are you suggesting a new
attack vector, or a piggy-back off of the cold boot attack?

G



- ----- Original Message ----- 
From: "Tim Hollebeek" <[EMAIL PROTECTED]>
To: <fde@www.xml-dev.com>
Sent: Monday, August 04, 2008 1:28 PM
Subject: Re: [FDE] software defense for "cold boot" attack?


> 
>> In this
>> lecture, I'll explain how we could have access to the undocumented
>> hibernation file. There is no need to act within 2 minutes of
>> shutdown...
>> READ and WRITE access to it. I'll also show how to use this file in
>> defensive and also offensive cases.
> 
> I hope you'll include the details of how you accomplish this when the
> hibernation file is on the encrypted portion of the disk.  That will
> be the fascinating part.
> 
> Let's keep this discussion civil.  I know everyone has their own personal
> agendas, but trashing other bright people's work isn't necessary.
> 
> 
> _______________________________________________
> FDE mailing list
> FDE@www.xml-dev.com
> http://www.xml-dev.com/mailman/listinfo/fde

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028) - not licensed for commercial use: 
www.pgp.com
Charset: utf-8

wj8DBQFIl1K+SGIRT5oVahwRAtV5AJ9cSdAIOAuZeFvTAocE1pFKt2JfPACeJjp8
0uajLbR24uuEruc+0Sq7Gos=
=AS/j
-----END PGP SIGNATURE-----

_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to