• Open Menu Close Menu
  • Apple
  • Shopping Bag
  • Apple
  • Mac
  • iPad
  • iPhone
  • Watch
  • TV
  • Music
  • Support
  • Search apple.com
  • Shopping Bag

Lists

Open Menu Close Menu
  • Terms and Conditions
  • Lists hosted on this site
  • Email the Postmaster
  • Tips for posting to public mailing lists
[Fed-Talk] Breaking hard disk encryption
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Fed-Talk] Breaking hard disk encryption


  • Subject: [Fed-Talk] Breaking hard disk encryption
  • From: Todd Heberlein <email@hidden>
  • Date: Thu, 27 Dec 2012 12:27:52 -0800

A nice summary by Bruce Schneier of products to break hard disk encryption. In a nutshell, there is a good chance that the encryption key in somewhere on your system: in memory, hibernation files, or regular files. These tools just go after the key.

In some circles (like government groups) there is a huge push to encrypt all laptop hard drives in case they are lost or stolen. I wonder what percent of these laptops are just asleep (not shutdown)? And of these, I wonder how many are susceptible to these attacks?


Breaking Hard-Disk Encryption
http://www.schneier.com/blog/archives/2012/12/breaking_hard-d.html

The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. 


Todd

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list      (email@hidden)
Help/Unsubscribe/Update your Subscription:

This email sent to email@hidden

  • Follow-Ups:
    • Re: [Fed-Talk] Breaking hard disk encryption
      • From: "Neely, Lee" <email@hidden>
  • Prev by Date: Re: [Fed-Talk] Trade group objects to proposed NIST mobile security guidelines
  • Next by Date: Re: [Fed-Talk] Breaking hard disk encryption
  • Previous by thread: [Fed-Talk] Evernote
  • Next by thread: Re: [Fed-Talk] Breaking hard disk encryption
  • Index(es):
    • Date
    • Thread