STeve Andre' escreveu: > > The research is very interesting, but it doesn't apply to OpenBSD. > > --STeve Andre' > > Why doesn't apply to openbsd? And secondly, would vnd devices be affected by this kind of attack? I particularly believe that this could be done, i also saw those kind of display "dumps" with some video cards that have DRAM memory. Better never more let my crypt disk left open. But there is a feature in truecrypt, that i believe can defeat this. It can use a file in conjunction with the password. The attacker can successfully guess the password, but without knowing the file used, it would be pointless. The only problem is if tc keep the filename also in memory :(. Will investigate this matter.
My regards, -- Giancarlo Razzolini Linux User 172199 Red Hat Certified Engineer no:804006389722501 Moleque Sem Conteudo Numero #002 Slackware Current OpenBSD Stable Ubuntu 7.04 Feisty Fawn Snike Tecnologia em Informatica 4386 2A6F FFD4 4D5F 5842 6EA0 7ABE BBAB 9C0E 6B85 [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]