cold boot attacks on disk encryption
The Fungi
fungi at yuggoth.org
Sun Mar 16 10:26:56 EDT 2008
On Sat, Feb 23, 2008 at 05:09:29AM +1300, Peter Gutmann wrote:
> There were commercial products that did this available some years
> ago, they hooked into the Windows auth using a custom GINA DLL
> (GINA = the Windows extensible login/authentication mechanism,
> think PAM for Windows) and locked the machine when you moved away
> from it. They failed in the marketplace, there was no interest in
> them from users (or at least several of them failed, some may
> still be around).
[...]
Saw an interesting free software example of this the other day (not
for Windows, of course) using loss of signal from a particular
bluetooth device (mobile phone, et cetera) to lock your machine or
run other designated commands:
http://sourceforge.net/projects/blueproximity/
It also supports *unlocking* on approach, but that's a bad idea
unless they can start providing a client to run on the "token"
device (maybe using asymmetric key crypto to sign and verify a
challenge string instead of just looking for the device's BT
address).
--
{ IRL(Jeremy_Stanley); PGP(9E8DFF2E4F5995F8FEADDC5829ABF7441FB84657);
SMTP(fungi at yuggoth.org); IRC(fungi at irc.yuggoth.org#ccl); ICQ(114362511);
AIM(dreadazathoth); YAHOO(crawlingchaoslabs); FINGER(fungi at yuggoth.org);
MUD(fungi at katarsis.mudpy.org:6669); WWW(http://fungi.yuggoth.org/); }
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list