STeve Andre' escreveu:
>
> The research is very interesting, but it doesn't apply to OpenBSD.
>
> --STeve Andre'
>
>
Why doesn't apply to openbsd? And secondly, would vnd devices be
affected by this kind of attack? I particularly believe that this could
be done, i also saw those kind of display "dumps" with some video cards
that have DRAM memory. Better never more let my crypt disk left open.
But there is a feature in truecrypt, that i believe can defeat this. It
can use a file in conjunction with the password. The attacker can
successfully guess the password, but without knowing the file used, it
would be pointless. The only problem is if tc keep the filename also in
memory :(. Will investigate this matter.

My regards,

--
Giancarlo Razzolini
Linux User 172199
Red Hat Certified Engineer no:804006389722501
Moleque Sem Conteudo Numero #002
Slackware Current
OpenBSD Stable
Ubuntu 7.04 Feisty Fawn
Snike Tecnologia em Informatica
4386 2A6F FFD4 4D5F 5842  6EA0 7ABE BBAB 9C0E 6B85

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]

Reply via email to