What Steve said...

You could unlock my safe if I gave you the keys as well, which is all that
is happening here.

Even the bit about using the hibernation file is not worthy of the headline
they provided...

It's not like they're *cracking* the encyption.






*ASB
**http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>*
**Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market…***





On Fri, Dec 21, 2012 at 2:06 PM, Jonathan Link <[email protected]>wrote:

> Alright, that's what I thought and I was wrestling with the question. Am I
> crazy or missing something here?
>
> I know, yes and yes.  Still...
>
>
>
> On Fri, Dec 21, 2012 at 1:58 PM, Steve Kradel <[email protected]> wrote:
>
>> I don't find this alarming at all: it requires access to the key data,
>> and is useful if you have a memory dump or a cleartext hibernation
>> file (hiberfil.sys is going to be *encrypted* on a hibernating machine
>> with whole-disk encryption).  This tool appears to be a good
>> time-saver, given a memory dump, because it knows where to look in for
>> the keys and how to extract them, but it does not attack any inherent
>> cryptographic weakness or key management problems in PGP, TC, etc..
>>
>> --Steve
>>
>> On Fri, Dec 21, 2012 at 1:34 PM, Matthew W. Ross
>> <[email protected]> wrote:
>> > I'm no security expert.
>> >
>> > But I do assume that if the physical machine is compromised, then the
>> data it holds is as good as compromised as well, no matter what level of
>> encryption you have.
>> >
>> >
>> > --Matt Ross
>> > Ephrata School District
>> >
>> >
>> > ----- Original Message -----
>> > From: Ziots, Edward
>> > [mailto:[email protected]]
>> > To: NT System Admin Issues
>> > [mailto:[email protected]]
>> > Sent: Fri, 21 Dec 2012
>> > 09:57:51 -0800
>> > Subject: RE: Disk encryption killer: Anyone see this?
>> >
>> >
>> >> I would say off the record no, if you used popular encryption software
>> >> and a repeatable process, but when you lose physical security of an
>> >> asset, given a reasonable amount of time and effort the encryption will
>> >> be cracked and data will be obtained.
>> >>
>> >>
>> >>
>> >> Z
>> >>
>> >>
>> >>
>> >> Edward E. Ziots, CISSP, Security +, Network +
>> >>
>> >> Security Engineer
>> >>
>> >> Lifespan Organization
>> >>
>> >> [email protected]
>> >>
>> >>
>> >>
>> >> From: Chinnery, Paul [mailto:[email protected]]
>> >> Sent: Friday, December 21, 2012 12:37 PM
>> >> To: NT System Admin Issues
>> >> Subject: RE: Disk encryption killer: Anyone see this?
>> >>
>> >>
>> >>
>> >> Oh, great.  I wonder what view CMS will take if a laptop is stolen\lost
>> >> and it's encrypted.  Will they still say it's a HIPAA violation?
>> >>
>> >>
>> >>
>> >> From: David Lum [mailto:[email protected]]
>> >> Sent: Friday, December 21, 2012 12:29 PM
>> >> To: NT System Admin Issues
>> >> Subject: Disk encryption killer: Anyone see this?
>> >>
>> >>
>> >>
>> >> Comments anyone? Looks like bad news...
>> >>
>> >>
>> http://thenextweb.com/insider/2012/12/20/this-299-tool-is-reportedly-cap
>> >> able-of-cracking-bitlocker-pgp-and-truecrypt-disks-in-real-time/
>> >>
>> >>
>> >>
>> >> David Lum
>> >> Sr. Systems Engineer // NWEATM
>> >> Office 503.548.5229 // Cell (voice/text) 503.267.9764
>> >>
>> >>
>> >>
>> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> >>
>> >> ---
>> >> To manage subscriptions click here:
>> >> http://lyris.sunbelt-software.com/read/my_forums/
>> >> or send an email to [email protected]
>> >> with the body: unsubscribe ntsysadmin
>> >>
>> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> >>
>> >> ---
>> >> To manage subscriptions click here:
>> >> http://lyris.sunbelt-software.com/read/my_forums/
>> >> or send an email to [email protected]
>> >> with the body: unsubscribe ntsysadmin
>> >>
>> >>
>> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> >>
>> >> ---
>> >> To manage subscriptions click here:
>> >> http://lyris.sunbelt-software.com/read/my_forums/
>> >> or send an email to [email protected]
>> >> with the body: unsubscribe ntsysadmin
>> >
>> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> >
>> > ---
>> > To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> > or send an email to [email protected]
>> > with the body: unsubscribe ntsysadmin
>> >
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to [email protected]
>> with the body: unsubscribe ntsysadmin
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to