Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-12 Thread bugtraq
> > http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ > > Research grant ideas for 2010: > > 1) Replacing not only the computer, but victim's entire apartment, > with cardboard cutouts to intercept passwords, You know your continued innovation continues to inspire and amaze us.

Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread yaroslav
I couldn't imagine a method more reliable than thermorectal cryptoanalysis, but you have done it with number 3). however, there is a weak point: if, during the process of universe destruction, an attacker are under constant observation by someone, his psi-function might eventually collapse somewhe

Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread Michal Zalewski
> http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ Research grant ideas for 2010: 1) Replacing not only the computer, but victim's entire apartment, with cardboard cutouts to intercept passwords, 2) Substituting victim's spouse with a conspicuously German lookalike, 3) Destroy

Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread Thor (Hammer of God)
/me sheepishly acquiesces to Dan publically. Dan is right, I am wrong. After consulting our resident grammar expert, I have been corrected. My apologies to Dan for incorrectly attributing a grammatical error to his piece. I was going to bet on it too ;) t -Original Message- From: Da

Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread Thor (Hammer of God)
God) Sent: Friday, December 11, 2009 1:29 PM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Brilliant attack "bypasses" bitlocker http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ This "method" is almost as bad as Dan's grammar ;)

[Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread Thor (Hammer of God)
http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ This "method" is almost as bad as Dan's grammar ;) "Among the methods discussed is what they call a "hardware-level phishing attack," in which a target machine is replaced with a counterfeit one that provides precisely the same