Re: [Fed-Talk] Breaking hard disk encryption
Re: [Fed-Talk] Breaking hard disk encryption
- Subject: Re: [Fed-Talk] Breaking hard disk encryption
- From: "Neely, Lee" <email@hidden>
- Date: Fri, 28 Dec 2012 16:07:39 +0000
- Thread-topic: [Fed-Talk] Breaking hard disk encryption
Good article, thanks for sharing.
When deploying disk encryption solutions, you need to fully follow the best practices to ensure the keys are destroyed appropriately. In the case of FileVault 2, you need to implement the best practices. One guide that covers this is
http://training.apple.com/pdf/WP_FileVault2.pdf - don’t forget to read Appendix A.
Lee
From: fed-talk-bounces+neely1=email@hidden [mailto:fed-talk-bounces+neely1=email@hidden]
On Behalf Of Todd Heberlein
Sent: Thursday, December 27, 2012 12:28 PM
To: email@hidden Talk
Subject: [Fed-Talk] Breaking hard disk encryption
A nice summary by Bruce Schneier of products to break hard disk encryption. In a nutshell, there is a good chance that the encryption key in somewhere on your system: in memory, hibernation files, or regular files. These tools just go after
the key.
In some circles (like government groups) there is a huge push to encrypt all laptop hard drives in case they are lost or stolen. I wonder what percent of these laptops are just asleep (not shutdown)? And of these, I wonder how many are
susceptible to these attacks?
Breaking Hard-Disk Encryption
The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt.
|
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden