Re: wrt Cold Boot Attacks on Disk Encryption

2008-03-15 Thread Ken Buchanan
A lot of people seem to agree with what Declan McCullagh writes here: It's going to make us rethink how we handle laptops in sleep mode and servers that use encrypted filesystems (a mail server, for instance). What I'd like to know is why people weren't already rethinking this when people

Re: wrt Cold Boot Attacks on Disk Encryption

2008-03-15 Thread Jacob Appelbaum
Ken Buchanan wrote: A lot of people seem to agree with what Declan McCullagh writes here: It's going to make us rethink how we handle laptops in sleep mode and servers that use encrypted filesystems (a mail server, for instance). What I'd like to know is why people weren't already

Re: wrt Cold Boot Attacks on Disk Encryption

2008-03-15 Thread Len Sassaman
On Mon, 25 Feb 2008, Ken Buchanan wrote: Adam Boileau demonstrated finding passwords, but of course we already know that it's easy to locate cryptographic keys in large volumes of data (Shamir, van Someren: http://citeseer.ist.psu.edu/265947.html). This was implemented (in part by some of my

wrt Cold Boot Attacks on Disk Encryption

2008-02-21 Thread ' =JeffH '
From:David Farber [EMAIL PROTECTED] Subject: [IP] Cold Boot Attacks on Disk Encryption -- report on To: ip [EMAIL PROTECTED] Date:Thu, 21 Feb 2008 16:25:43 -0500 Begin forwarded message: From: Declan McCullagh [EMAIL PROTECTED] Date: February 21, 2008 3:57:43 PM EST To: [EMAIL