"It seems logical that the any key's *must* pass through ram, as there
is no other place to store any information until the drive is unlocked."

Well, you can enter and type information in the BIOS without RAM even
installed.









-----Original Message-----
From: Mike Gill [mailto:[EMAIL PROTECTED] 
Sent: Monday, February 25, 2008 5:08 PM
To: NT System Admin Issues
Subject: RE: Security boffins unveil BitUnlocker

The encryption type doesn't matter, as it's not what is under attack.
They're pulling they key the user types in at boot from the ram. It
seems
logical that the any key's *must* pass through ram, as there is no other
place to store any information until the drive is unlocked.

-- 
Mike Gill


> -----Original Message-----
> From: Sam Cayze [mailto:[EMAIL PROTECTED]
> Sent: Monday, February 25, 2008 2:38 PM
> To: NT System Admin Issues
> Subject: RE: Security boffins unveil BitUnlocker
> 
> They make no mention of how this works as far as the encryption type.
> Ie, Bitlocker, Truecrypt, PGP, etc are all software based encryption.
> 
> What about hardware based disk encryption?  Do the keys ever pass
> though
> RAM?  Could a similar tactic be used?



~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

Reply via email to