I conveniently got an email from Secude in my inbox. One of the closing paras 
had the following:


As you continue your investigation of disk-encryption technologies, I invite 
you to contact us to learn more about our partnership with Seagate and other 
hard drive manufacturers and how we eliminate the types of vulnerabilities 
found in DRAM attacks.  By encrypting data at the drive level, we are able to 
offer you the highest level of protection.  


Of course, that's not true at all. The vulnerability of data residing in DRAM 
still exists. That will be the case until we get "secure RAM," or something 
along those lines.

However, it is true that the particular attack involving reading the FDE key 
directly from RAM is defeated since that key is never written to RAM.

Maybe I'm being too picky here, but looking ahead, this technique could be used 
to read information from any application that happens to be open at the moment 
using software that looks for juicy keywords (like "confidential" or 
"password"). Doesn't that seem like the next logical threat once the 
"low-hanging fruit" (such as it is) of cold-boot key discovery is patched? I 
mean, how long are we going to have secure disks with wide-open RAM chips?

- Garrett
_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to