http://www.news.com/8301-13578_3-9876060-38.html?tag=nefd.lede
A group from Princeton University described this "exploit," although whether it is one is debatable...
The technique works against most encryption schemes, including the one I use on my iMac and the one on this Eee....
Microsoft acknowledges it.
Interestingly, the exploit can supposedly even be done by cooling the memory, extracting it from the computer, and reading it elsewhere.
Realistically, it's not much of a vulnerability. But it is interesting, because the tacit assumption is that a locked, encrypted laptop is safe whether or not it's on....
A group from Princeton University described this "exploit," although whether it is one is debatable...
Their technique doesn't attack the encryption directly. Rather, it relies on gaining access to the contents of a computer's RAM--through a mechanism as simple as booting a laptop over a network or from a USB drive--and then scanning for encryption keys.
The technique works against most encryption schemes, including the one I use on my iMac and the one on this Eee....
The researchers say their technique works against Apple's FileVault, the BitLocker Drive Encryption feature included in the Enterprise and Ultimate versions of Windows Vista, the open-source product TrueCrypt, and the dm-crypt subsystem built into Linux kernels starting with 2.6. The other researchers include William Clarkson, William Paul, and Ariel J. Feldman.
Microsoft acknowledges it.
Interestingly, the exploit can supposedly even be done by cooling the memory, extracting it from the computer, and reading it elsewhere.
Realistically, it's not much of a vulnerability. But it is interesting, because the tacit assumption is that a locked, encrypted laptop is safe whether or not it's on....