Re: [Encfs-users] Protection against cold boot attacks

2012-10-01 Thread Werner Koch
On Fri, 7 Sep 2012 04:51, vali...@gmail.com said: > This is under the control of the operating system. Encfs needs around 4MB > of memory to run. It applies mlock() to secure memory blocks, but that > depends on OS support for user-level locking. Using an encrypted swap partition is a much eas

Re: [Encfs-users] Protection against cold boot attacks

2012-09-06 Thread Valient Gough
On Sat, Sep 1, 2012 at 10:47 AM, wrote: > Does encfs ensure that passphrases and key material are in memory only as > long as absolutely neccessary? There are calls to mlock in code, is it safe > to assume that passphrases and keys do not get swapped to the disk? > Some protections depend on sup

[Encfs-users] Protection against cold boot attacks

2012-09-01 Thread andres
Does encfs ensure that passphrases and key material are in memory only as long as absolutely neccessary? There are calls to mlock in code, is it safe to assume that passphrases and keys do not get swapped to the disk? In particular, the following would be good to have: - When encfs exits or unmoun