Hi,
Use case:
-
Usually when people do full disk encryption, it's not really full disk,
instead they still have a /boot in clear.
So an evil maid attack can still be done, in two passes:
1) Clone the hdd, Infect the initramfs or the kernel.
2) Wait for the user to enter its password,
On Thu, Oct 2, 2014 at 3:51 PM, John Lewis jle...@johnlewis.ie wrote:
On 02/10/14 19:31, Aaron Durbin wrote:
On Mon, Sep 22, 2014 at 3:21 PM, John Lewis jle...@johnlewis.ie wrote:
On 22/09/14 19:59, Aaron Durbin wrote:
On Mon, Sep 22, 2014 at 12:24 PM, John Lewis jle...@johnlewis.ie
On 02/10/14 22:25, Aaron Durbin wrote:
On Thu, Oct 2, 2014 at 3:51 PM, John Lewis jle...@johnlewis.ie wrote:
On 02/10/14 19:31, Aaron Durbin wrote:
On Mon, Sep 22, 2014 at 3:21 PM, John Lewis jle...@johnlewis.ie wrote:
On 22/09/14 19:59, Aaron Durbin wrote:
On Mon, Sep 22, 2014 at
3 matches
Mail list logo