Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ImJustAnotherOkie
The only way to protect against that sort of attack is full-disk encryption combined with a fail-safe way to clear RAM if the case is breached. Otherwise, if they steal your machine, they can browse its disk at their leisure. No need to recover or guess your password.

And why don't they just disable the Firewire port if the user is not logged in or if a password-protected screen saver is running?

10 posted on 07/27/2011 10:26:15 AM PDT by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies ]


To: cynwoody

Disk encryption won’t help, once they get your password you’re toast. The only thing that could work would be individual file level encryption with a memorized key.


23 posted on 07/27/2011 11:34:30 AM PDT by ImJustAnotherOkie (zerogottago)
[ Post Reply | Private Reply | To 10 | View Replies ]

To: cynwoody

The Thunderbolt interface is just as vulnerable as Firewire.

After doing some research i5 - i7 cpu’s have a protective, OS controlled, layer from this sort of DMA attack.

I’m not aware if OSX is providing this protection. It would be one hell of a marketing coup if they do? But then they would have to admit their older hardware was vulnerable.


24 posted on 07/27/2011 11:39:02 AM PDT by ImJustAnotherOkie (zerogottago)
[ Post Reply | Private Reply | To 10 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson