Hi

Another issue is so called "cold boot atack"
http://www.engadget.com/2008/02/21/cold-boot-disk-encryption-attack-is-shockingly-effective/
http://www.youtube.com/watch?v=Y_70UC0tPUU
It can be used even against encrypted disks.

Best regards,
ILYA

On Wed, May 6, 2009 at 8:44 PM, Ralph Pichie <[email protected]> wrote:
> "Researchers have extracted information from nothing more than the
> reflection of a computer monitor off an eyeball or the sounds
> emanating from a printer."
>
> http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections
> It's in the print version, May 2009 issue as well.
>
> Not something that I would worry about in most circumstances, but food
> for thought (and probably some paranoia). Ok, I have to go. There are
> two guys in black at my door...
>
> _______________________________________________
> clug-talk mailing list
> [email protected]
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> **Please remove these lines when replying
>

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to