[dm-crypt] LUKS/dm-crypt vulnerable?

Luca Berra bluca at comedia.it
Mon Aug 10 08:12:46 CEST 2009

On Sat, Aug 08, 2009 at 05:36:35PM +0200, Heinz Diehl wrote:
>But what happens when the machine is powered off and stolen?
>The thief wants to have my data. Can he/she use something like "stoned" to
>get into the system and decrypt the harddisk contents?
To achieve this, they will have to hand it back, wait for you to type
your password to boot, then steal it again :P

Stoned is just a trojan that installs into the boot sector,
a very well done trojan, but that is.
The whole argument about stoned and truecrypt is that stoned developer
insisted truecrypt was not secure, because it did not enforce checking
of boot sector integrity.
Truecrypt developers said that was a moot point, because, if someone is
able to replace the boot sector it could well replace the code that
checks its integrity.

add a bit of hype, mix .....


Luca Berra -- bluca at comedia.it
         Communication Media & Services S.r.l.
  / \

More information about the dm-crypt mailing list