Re: [Full-disclosure] Brilliant attack bypasses bitlocker

2009-12-12 Thread bugtraq
http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ Research grant ideas for 2010: 1) Replacing not only the computer, but victim's entire apartment, with cardboard cutouts to intercept passwords, You know your continued innovation continues to inspire and amaze us. In

[Full-disclosure] Brilliant attack bypasses bitlocker

2009-12-11 Thread Thor (Hammer of God)
http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ This method is almost as bad as Dan's grammar ;) Among the methods discussed is what they call a hardware-level phishing attack, in which a target machine is replaced with a counterfeit one that provides precisely the same

Re: [Full-disclosure] Brilliant attack bypasses bitlocker

2009-12-11 Thread Thor (Hammer of God)
To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Brilliant attack bypasses bitlocker http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ This method is almost as bad as Dan's grammar ;) Among the methods discussed is what they call a hardware-level phishing attack

Re: [Full-disclosure] Brilliant attack bypasses bitlocker

2009-12-11 Thread Thor (Hammer of God)
/me sheepishly acquiesces to Dan publically. Dan is right, I am wrong. After consulting our resident grammar expert, I have been corrected. My apologies to Dan for incorrectly attributing a grammatical error to his piece. I was going to bet on it too ;) t -Original Message- From:

Re: [Full-disclosure] Brilliant attack bypasses bitlocker

2009-12-11 Thread Michal Zalewski
http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ Research grant ideas for 2010: 1) Replacing not only the computer, but victim's entire apartment, with cardboard cutouts to intercept passwords, 2) Substituting victim's spouse with a conspicuously German lookalike, 3)

Re: [Full-disclosure] Brilliant attack bypasses bitlocker

2009-12-11 Thread yaroslav
I couldn't imagine a method more reliable than thermorectal cryptoanalysis, but you have done it with number 3). however, there is a weak point: if, during the process of universe destruction, an attacker are under constant observation by someone, his psi-function might eventually collapse