Re: [Full-disclosure] round and round they go

2008-02-23 Thread niclas
> hrm. sigh. Normal moles not being able to grasp trivial knowledge. *cough* > Airports are duh known conduits of business travellers with lots of > data, first question: do those travellers use encryption? from my experience, most people are just ignorant when it comes to security. how many no

Re: [Full-disclosure] round and round they go

2008-02-22 Thread Jay
barrel but more of a can of clue you would be better off. Jay - Original Message - From: niclas [mailto:[EMAIL PROTECTED] To: full-disclosure@lists.grok.org.uk Cc: [EMAIL PROTECTED],[EMAIL PROTECTED] Sent: Sat, 23 Feb 2008 01:16:48 +0100 Subject: Re: [Full-disclosure] round and round they go

Re: [Full-disclosure] round and round they go

2008-02-22 Thread niclas
> I would think a more realistic scenario might be a person working at > an airport shutting their system down then getting it stolen vs a > forensic examiner yanking the cord on purpose. Just an observation. if somebody steals your notebook at the air port the chance of this person just beeing an

Re: [Full-disclosure] round and round they go, keys in ram are ripe for picking...

2008-02-22 Thread coderman
On Fri, Feb 22, 2008 at 10:05 AM, Michael Holstein <[EMAIL PROTECTED]> wrote: > ... > FIPS 140-1 [http://www.itl.nist.gov/fipspubs/fip140-1.htm] addresses this. > ... > * The contents of the module shall be completely contained within a > tamper detection envelope... > * The module

Re: [Full-disclosure] round and round they go

2008-02-22 Thread Jay
PROTECTED] Cc: full-disclosure@lists.grok.org.uk Sent: Fri, 22 Feb 2008 09:57:55 -0500 Subject: Re: [Full-disclosure] round and round they go I found the article interesting, but I wonder about it's practicality. If you have physical access to the box you never really need to power down the b

Re: [Full-disclosure] round and round they go, keys in ram are ripe for picking...

2008-02-22 Thread Michael Holstein
> Countermeasures and their Limitations FIPS 140-1 [http://www.itl.nist.gov/fipspubs/fip140-1.htm] addresses this. [snip] *SECURITY LEVEL 4* In addition to the requirements for Security Levels 1, 2 and 3, the following requirements shall also apply to a multiple-chip embedded cryptographic m

Re: [Full-disclosure] round and round they go

2008-02-22 Thread matthew wollenweber
I found the article interesting, but I wonder about it's practicality. If you have physical access to the box you never really need to power down the box in the first place and generally if the box is already on, I think most people would prefer to attack a service to get on the system directly. Bu

Re: [Full-disclosure] round and round they go

2008-02-22 Thread niclas
> http://blog.wired.com/27bstroke6/2008/02/researchers-dis.html (cooling down DRAMs keeps their contents for longer time, even during reboot.) well, this shows how important mechanical security still is, even with all the crypto-stuff out there. if you e.g. just *glued* your RAM modules into your

Re: [Full-disclosure] round and round they go, keys in ram are ripe for picking...

2008-02-21 Thread coderman
On Thu, Feb 21, 2008 at 12:43 PM, Elazar Broad <[EMAIL PROTECTED]> wrote: > http://blog.wired.com/27bstroke6/2008/02/researchers-dis.html "Lest We Remember: Cold Boot Attacks on Encryption Keys" the best part is: ''' Countermeasures and their Limitations Memory imaging attacks are difficult to de

[Full-disclosure] round and round they go

2008-02-21 Thread Elazar Broad
http://blog.wired.com/27bstroke6/2008/02/researchers-dis.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/