Re: [liberationtech] A tool for encrypted laptops

2014-05-09 Thread Blibbet
On 5/9/14 1:08 PM, Steve Weis wrote: Hi Tom. Does hibernation on a Mac protect from physical memory extraction by default or is this something yontma configures? There may be an ACPI/UEFI attack here... UEFI Runtime Service drivers continue to run in the background while the main OS is running

Re: [liberationtech] A tool for encrypted laptops

2014-05-09 Thread Tom Ritter
On 9 May 2014 16:08, Steve Weis wrote: > Hi Tom. Does hibernation on a Mac protect from physical memory > extraction by default or is this something yontma configures? Not sure what you mean. Obviously we can't protect against someone unscrewing the computer and stealing the chips ;) > After a

Re: [liberationtech] A tool for encrypted laptops

2014-05-09 Thread Steve Weis
Hi Tom. Does hibernation on a Mac protect from physical memory extraction by default or is this something yontma configures? After a quick search, I ran across "destroyfvkeyonstandby" to destroy the FileVault key on standby. Is that sufficient? As for DMA attacks, my understanding is the latest O

Re: [liberationtech] A tool for encrypted laptops

2014-05-09 Thread Tomer Altman
itter" To: "liberationtech" Sent: Friday, May 9, 2014 11:41:41 AM Subject: Re: [liberationtech] A tool for encrypted laptops Hey all. Reviving an ld thread with a new release: https://isecpartners.github.io/news/tools/2014/05/09/yontma-mac-release.html >From the first email: I

Re: [liberationtech] A tool for encrypted laptops

2014-05-09 Thread Tom Ritter
Hey all. Reviving an ld thread with a new release: https://isecpartners.github.io/news/tools/2014/05/09/yontma-mac-release.html >From the first email: If your encrypted laptop has its screen locked, and is plugged into power or ethernet, the tool will hibernate your laptop if either of those

Re: [liberationtech] A tool for encrypted laptops

2013-05-30 Thread Seth David Schoen
Tom Ritter writes: > On 25 March 2013 11:57, Tom Ritter wrote: > > It the moment it only supports Bitlocker, but support for Truecrypt is > > coming[0]. \ > > Due to some internal confusion, this happened a little bit ago, but I > didn't know about it. You can now tell it "I'm smarter than you

Re: [liberationtech] A tool for encrypted laptops

2013-05-30 Thread Tom Ritter
On 25 March 2013 11:57, Tom Ritter wrote: > It the moment it only supports Bitlocker, but support for Truecrypt is > coming[0]. \ Due to some internal confusion, this happened a little bit ago, but I didn't know about it. You can now tell it "I'm smarter than you and have FDE you don't know abo

Re: [liberationtech] A tool for encrypted laptops

2013-03-26 Thread liberationtech
On Tue, 26 Mar 2013 13:03:56 + Michael Rogers wrote: > Last time I tried it wasn't simple to get Linux to hibernate with an > encrypted swap partition. Are there now distros that support this out > of the box? Works fine for me in Debian Wheezy, Fedora 17, and FreeBSD 9.something. -- Andre

Re: [liberationtech] A tool for encrypted laptops

2013-03-26 Thread Julian Oliver
..on Tue, Mar 26, 2013 at 01:03:56PM +, Michael Rogers wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On 26/03/13 09:59, Julian Oliver wrote: > > For your Linux laptop why not just use an encrypted file-system and > > lid-switch? Close the lid and the machine hibernates. If you f

Re: [liberationtech] A tool for encrypted laptops

2013-03-26 Thread Nick Daly
On Tue, Mar 26, 2013 at 8:03 AM, Michael Rogers wrote: > On 26/03/13 09:59, Julian Oliver wrote: >> For your Linux laptop why not just use an encrypted file-system and >> lid-switch? Close the lid and the machine hibernates. If you forget >> to close the lid then time it out to a screen lock. > > L

Re: [liberationtech] A tool for encrypted laptops

2013-03-26 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 26/03/13 09:59, Julian Oliver wrote: > For your Linux laptop why not just use an encrypted file-system and > lid-switch? Close the lid and the machine hibernates. If you forget > to close the lid then time it out to a screen lock. Can be done in > a

Re: [liberationtech] A tool for encrypted laptops

2013-03-26 Thread Julian Oliver
..on Tue, Mar 26, 2013 at 10:59:22AM +0100, Julian Oliver wrote: > ..on Tue, Mar 26, 2013 at 05:55:19AM +, Andreas Bader wrote: > > > Hi all - at the risk of shilling, my company has released an Open > > > Source tool called "You'll Never Take Me Alive". If your encrypted > > > laptop has its

Re: [liberationtech] A tool for encrypted laptops

2013-03-26 Thread Julian Oliver
..on Tue, Mar 26, 2013 at 05:55:19AM +, Andreas Bader wrote: > > Hi all - at the risk of shilling, my company has released an Open > > Source tool called "You'll Never Take Me Alive". If your encrypted > > laptop has its screen locked, and is plugged into power or ethernet, > > the tool will h

Re: [liberationtech] A tool for encrypted laptops

2013-03-25 Thread Andreas Bader
> Hi all - at the risk of shilling, my company has released an Open > Source tool called "You'll Never Take Me Alive". If your encrypted > laptop has its screen locked, and is plugged into power or ethernet, > the tool will hibernate your laptop if either of those plugs are > removed. So if you r

Re: [liberationtech] A tool for encrypted laptops

2013-03-25 Thread Tom Ritter
On 25 March 2013 14:41, Karl Fogel wrote: > Your paragraph above doesn't mention it, but appears this is (right now) > only for MS Windows. Any chance of Linux support coming soon, and in > the long run of getting folded in as a kernel service so that I can just > configure it from my System Sett

Re: [liberationtech] A tool for encrypted laptops

2013-03-25 Thread Karl Fogel
Tom Ritter writes: >Hi all - at the risk of shilling, my company has released an Open >Source tool called "You'll Never Take Me Alive". If your encrypted >laptop has its screen locked, and is plugged into power or ethernet, >the tool will hibernate your laptop if either of those plugs are >remove

[liberationtech] A tool for encrypted laptops

2013-03-25 Thread Tom Ritter
Hi all - at the risk of shilling, my company has released an Open Source tool called "You'll Never Take Me Alive". If your encrypted laptop has its screen locked, and is plugged into power or ethernet, the tool will hibernate your laptop if either of those plugs are removed. So if you run out for