Garrett:
Glad you "conveniently" received that email.J Yes, you may be a bit too picky. Our solution is to solve a Data At Rest problem that in pure Software Laptop Encryption products is broken by exposing the encryption key residing in PC DRAM and NOT to solve the problem of securing the contents of DRAM which would a different data exposure problem, of course. We make no claim to solve the problem of data exposed in DRAM, simply to not put data in DRAM at a point in time that it could be exposed and used to defeat HDD on board encryption technology. You may want to spend some time learning more about the Seagate drive, as it is quite an interesting and secure technology. If any of you will be attending the Data Protection Summit in LA next month, we will have a presentation on this specific topic (again DAR only), I will also be attending and would love to meet any members of this very enjoyable although overly cloaked group on this blog. Maybe we can even get together for a dinner one evening. I am sure that some of this blogs under cover vendors might even be willing to foot the bill. Regards, Larry ___________________________________________________ Larry Massey President SECUDE IT Security, LLC 380 Sundown Drive Dawsonville, GA 30534 USA Tel : +1 706 216 8609 Fax: +1 706 216 4696 Mobile : +1 706 215 3854 [EMAIL PROTECTED] <http://www.secude.com/> www.secude.com From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Garrett M. Groff Sent: Friday, February 29, 2008 2:07 PM To: [email protected] Subject: [FDE] DRAM attack - not thwarted at all by Seagate's drive I conveniently got an email from Secude in my inbox. One of the closing paras had the following: As you continue your investigation of disk-encryption technologies, I invite you to contact us to learn more about our partnership with Seagate and other hard drive manufacturers and how we eliminate the types of vulnerabilities found in DRAM attacks. By encrypting data at the drive level, we are able to offer you the highest level of protection. Of course, that's not true at all. The vulnerability of data residing in DRAM still exists. That will be the case until we get "secure RAM," or something along those lines. However, it is true that the particular attack involving reading the FDE key directly from RAM is defeated since that key is never written to RAM. Maybe I'm being too picky here, but looking ahead, this technique could be used to read information from any application that happens to be open at the moment using software that looks for juicy keywords (like "confidential" or "password"). Doesn't that seem like the next logical threat once the "low-hanging fruit" (such as it is) of cold-boot key discovery is patched? I mean, how long are we going to have secure disks with wide-open RAM chips? - Garrett
_______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
