[dm-crypt] Quick dm-crypt questions
ingo.schmitt at binarysignals.net
Wed Oct 29 16:46:10 CET 2014
On 10/29/14 15:59, * wrote:
> If an attacker has access on that level, they can probaly just do
> a memory-freeze attack or a fire-wire attack. Remember that
> disk encryption does not protect data while the system is running
> and has the data decrypted.
I thought, AES NI makes cold boot attacks almost impossible because
the master key will be hold in CPU's cache and not in system RAM.
Since I read that mail thread, I'm not sure about that anymore.
Pls enlighten me ;)
ingo.schmitt at binarysignals.net - GnuPG ID: 0xAFD687D2 |
FP: 7418 77A6 4B59 AF90 4A11 1CCE 91C9 FF1B AFD6 87D2 |
More information about the dm-crypt