Hello,
As if the latest research (which showed that RAM contents can be
recovered after power-down) was not enough, it seems as Firewire ports
can form yet an easier attack vector into FDE-locked laptops.
Windows hacked in seconds via Firewire
Hello Dave,
On 13/2/2008 21:26, Dave Korn wrote:
Or are you suggesting that it could encrypt each block OTF when it's first
accessed, or run the encryption in the background while the system was still
live, instead of converting the whole drive in one big bite?
Encrypting blocks only when
Hello,
On 11/2/2008 06:13, Ali, Saqib wrote:
I installed TrueCrypt on my laptop and ran some benchmark tests/
Benchmark Results:
http://www.full-disk-encryption.net/wiki/index.php/TrueCrypt#Benchmarks
Pros:
1) Easy to use product. Simple clean interface. Very user-friendly!
2) Free and Open
List,
Finally, an open source FDE (Full Disk Encryption) for Win32. It is the
first one I am aware of:
www.truecrypt.org
TC is not a new player, but starting February 5th (version 5) it also
provides FDE.
Didn't get to try it yet.
Hagai.
Hi,
On 13/09/07 15:14, Ian G wrote:
Hagai Bar-El wrote:
Hi,
On 12/09/07 08:56, Aram Perez wrote:
The IronKey appears to provide decent security while it is NOT plugged
into a PC. But as soon as you plug it in and you have to enter a
password to unlock it, the security level quickly drops
with the brute-force attack vector, which does
exist in many other similar products. So it's not perfect, and I would
certainly not bet my life on it, probably not even my life's data, but
it's reasonable.
Hagai.
--
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com
and the
reasonable robustness they provide, which is the most desirable feature
after all.
Hagai.
--
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com
-
The Cryptography Mailing List
Unsubscribe by sending
with ones
that implement proprietary crypto...
And, of course, the source code is probably published also because the
marketing guys (probably) said that people skilled in the art will
appreciate this feature when evaluating this product against others.
Hagai.
--
Hagai Bar-El - Information
known.
Hagai.
--
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Hello David,
On 22/04/07 00:04, David Wagner wrote:
Hagai Bar-El writes:
What Aram wrote is many of the attendees have very little security
experience, not: there are no attendees with security experience.
There are people at the relevant OMA group who know enough about
security, but just
and examine it too.
--
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
to the questions you presented,
but more to the rationale of the entire system. I am just trying to
understand this better.
Regards,
Hagai.
--
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com
Hello,
I would like to notify you all of a new mailing list forum which I
opened. It is called Practical Security and is aimed at discussing
security measures in the context of real problems in real projects.
It has a much narrower scope than the Cryptography mailing list and
by no means
this issue I
will be glad if he posts it on the list. Also, if any one of you
would like to get a copy of this paper when it's done, please let me
know by e-mailing me directly.
Regards,
Hagai.
---
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com
.
---
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
15 matches
Mail list logo