A lot of people seem to agree with what Declan McCullagh writes here:
It's going to make us rethink how we handle laptops in sleep mode and servers
that use
encrypted filesystems (a mail server, for instance).
What I'd like to know is why people weren't already rethinking this
when people
Ken Buchanan wrote:
A lot of people seem to agree with what Declan McCullagh writes here:
It's going to make us rethink how we handle laptops in sleep mode and
servers that use
encrypted filesystems (a mail server, for instance).
What I'd like to know is why people weren't already
On Mon, 25 Feb 2008, Ken Buchanan wrote:
Adam Boileau demonstrated finding passwords, but of course we already
know that it's easy to locate cryptographic keys in large volumes of
data (Shamir, van Someren: http://citeseer.ist.psu.edu/265947.html).
This was implemented (in part by some of my
From:David Farber [EMAIL PROTECTED]
Subject: [IP] Cold Boot Attacks on Disk Encryption -- report on
To: ip [EMAIL PROTECTED]
Date:Thu, 21 Feb 2008 16:25:43 -0500
Begin forwarded message:
From: Declan McCullagh [EMAIL PROTECTED]
Date: February 21, 2008 3:57:43 PM EST
To: [EMAIL