BreachExchange mailing list archives
OT: Encryption keys persist in RAM, after shutdown, enabling FDE bypass
From: Chris Walsh <chris () cwalsh org>
Date: Thu, 21 Feb 2008 10:54:57 -0600
Ed Felten and colleagues have a paper out which shows how full disk encryption products, among them BitLocker, can be defeated by reading encryption keys from RAM chips *after the machine has been powered off*. See http://citp.princeton.edu/memory/ for more. _______________________________________________ Dataloss Mailing List (dataloss () attrition org) http://attrition.org/dataloss Tenable Network Security offers data leakage and compliance monitoring solutions for large and small networks. Scan your network and monitor your traffic to find the data needing protection before it leaks out! http://www.tenablesecurity.com/products/compliance.shtml
Current thread:
- OT: Encryption keys persist in RAM, after shutdown, enabling FDE bypass Chris Walsh (Feb 21)