Hey all. Reviving an ld thread with a new release:
https://isecpartners.github.io/news/tools/2014/05/09/yontma-mac-release.html
From the first email: If your encrypted laptop has its screen locked,
and is plugged into power or ethernet, the tool will hibernate your
laptop if either of those
...@ritter.vg
To: liberationtech liberationtech@lists.stanford.edu
Sent: Friday, May 9, 2014 11:41:41 AM
Subject: Re: [liberationtech] A tool for encrypted laptops
Hey all. Reviving an ld thread with a new release:
https://isecpartners.github.io/news/tools/2014/05/09/yontma-mac-release.html
From
Hi Tom. Does hibernation on a Mac protect from physical memory
extraction by default or is this something yontma configures?
After a quick search, I ran across destroyfvkeyonstandby to destroy
the FileVault key on standby. Is that sufficient?
As for DMA attacks, my understanding is the latest OS
On 9 May 2014 16:08, Steve Weis stevew...@gmail.com wrote:
Hi Tom. Does hibernation on a Mac protect from physical memory
extraction by default or is this something yontma configures?
Not sure what you mean. Obviously we can't protect against someone
unscrewing the computer and stealing the
On 5/9/14 1:08 PM, Steve Weis wrote:
Hi Tom. Does hibernation on a Mac protect from physical memory
extraction by default or is this something yontma configures?
There may be an ACPI/UEFI attack here... UEFI Runtime Service drivers
continue to run in the background while the main OS is
Tom Ritter writes:
On 25 March 2013 11:57, Tom Ritter t...@ritter.vg wrote:
It the moment it only supports Bitlocker, but support for Truecrypt is
coming[0]. \
Due to some internal confusion, this happened a little bit ago, but I
didn't know about it. You can now tell it I'm smarter
..on Tue, Mar 26, 2013 at 05:55:19AM +, Andreas Bader wrote:
Hi all - at the risk of shilling, my company has released an Open
Source tool called You'll Never Take Me Alive. If your encrypted
laptop has its screen locked, and is plugged into power or ethernet,
the tool will hibernate
..on Tue, Mar 26, 2013 at 10:59:22AM +0100, Julian Oliver wrote:
..on Tue, Mar 26, 2013 at 05:55:19AM +, Andreas Bader wrote:
Hi all - at the risk of shilling, my company has released an Open
Source tool called You'll Never Take Me Alive. If your encrypted
laptop has its screen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 26/03/13 09:59, Julian Oliver wrote:
For your Linux laptop why not just use an encrypted file-system and
lid-switch? Close the lid and the machine hibernates. If you forget
to close the lid then time it out to a screen lock. Can be done in
a
On Tue, 26 Mar 2013 13:03:56 +
Michael Rogers mich...@briarproject.org wrote:
Last time I tried it wasn't simple to get Linux to hibernate with an
encrypted swap partition. Are there now distros that support this out
of the box?
Works fine for me in Debian Wheezy, Fedora 17, and FreeBSD
Hi all - at the risk of shilling, my company has released an Open
Source tool called You'll Never Take Me Alive. If your encrypted
laptop has its screen locked, and is plugged into power or ethernet,
the tool will hibernate your laptop if either of those plugs are
removed. So if you run out for
Tom Ritter t...@ritter.vg writes:
Hi all - at the risk of shilling, my company has released an Open
Source tool called You'll Never Take Me Alive. If your encrypted
laptop has its screen locked, and is plugged into power or ethernet,
the tool will hibernate your laptop if either of those plugs
On 25 March 2013 14:41, Karl Fogel kfo...@red-bean.com wrote:
Your paragraph above doesn't mention it, but appears this is (right now)
only for MS Windows. Any chance of Linux support coming soon, and in
the long run of getting folded in as a kernel service so that I can just
configure it
Hi all - at the risk of shilling, my company has released an Open
Source tool called You'll Never Take Me Alive. If your encrypted
laptop has its screen locked, and is plugged into power or ethernet,
the tool will hibernate your laptop if either of those plugs are
removed. So if you run out
14 matches
Mail list logo