Disk encryption can be beaten

name='teknokid' said:
Damn, thats clever!!

What a waste though, they had ram at -50 and didnt overclock it?

LOL :D

I gotta admit that is clever. Now that leaves Ram makers such as Corsair, Crucial to do something about it and make even more money
 
U can`t seriously tell me they`re just figuring this out ?

On the now ancient commodore series, with limited success, u could install a program, turn off the computer, take the cartridge out (or obviously u don`t do a disk or tape load) and the program would remain in the memory.

The length of time was dependant on how corrupt the program would be. Equally pictures etc.
 
I remember reading about this a month or so ago. Was on regular computer though.

It's called a cold boot attack i believe. I wonder if this is called something different as the laptop is put to sleep rather than shut down and whether that makes a difference.

Still definitely something to think about. Quite difficult to get around. I suppose you could heat your RAM to 80 oC every time you close down.
 
If you are worried about encryption the there are plenty of other programs which interrupt the boot cycle forcing you to enter a password, even a simple bios password. Some of our work laptops have over seven passwords, dongles and all sorts of stuff. If they get beat then it is by someone working for a big government who is really interested in the laptop.

Still an interesting article
 
I think that the custom OS can bypass the password. Could they flash the bois to stop the password?

I heard that there is a responce out that forces an over write on the RAM during POST if it was not shut down properly and no doubt over writes the RAM on shutdown too.
 
Back
Top