It's a pretty exotic attack if you're using authentication (ie not Bitlocker in TPM mode, or some autoboot mode).
You'd have to attack a FDE protected machine that was on, or was on only a very short time ago (minutes). Most data exposure comes from people stealing drives or machines from cars etc which are long off. This is also not that new (though it seems to be creating a lot of panic today) - it's an attack considered for many years. And of course with FDE, the simple act of zeroing all copies of the key from memory on shutdown would resolve the "just off" scenario, though nothing except something like Danbury or Seagate FDE solves the "stolen while on" situation - but in that case, there are many good, but perhaps more exotic attacks, like the firewire memory download, or any potential network attack points. On Feb 21, 3:19 pm, "Ali, Saqib" <[EMAIL PROTECTED]> wrote: > http://citp.princeton.edu/memory/ > > However, hardware based encrypted drives like Seagate FDE would easily > deter these type of attacks. > _______________________________________________ > FDE mailing list > [EMAIL PROTECTED]://www.xml-dev.com/mailman/listinfo/fde _______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
