Results 1 to 19 of 19

Thread: Disk encryption may not be secure enough....

  1. #1
    Wanna Pull My Finger?
    Join Date
    Sep 2007
    Location
    Oklahoma
    Posts
    3,648

    Disk encryption may not be secure enough....

    Just found this disturbing article..........

    http://www.news.com/8301-13578_3-987...?tag=nefd.lede
    Donate to Xtreme Systems!

    Now Showing:
    Gigabyte x48-DQ6, Q6600,OCZ 1066 Reapers,2 750gb seagate 7200.11 hd, BFG 8800GTS 512,PC P&C 750 Quad psu, 24" Sceptre lcd, Antec 900

    my wife's system now!
    Intel C2D 6400, Zotac Matx mobo, 1gb kingston mem, Nvidia 7050, I Feel really Good now!
    Jon C2D 6600 Zotac mobo 1gb mem............................................... ................. HTPC qx6700@3.0ghz
    Annabelle Amd 3800+@2.4ghz, Biostar mobo, 1gb ocz pc4500 beta's................. Optyx2 opty165@ 2.1 ghz

    'Want a real high?
    Come crunch WCG and you'll feel like your on QuadCaine"



    First loops are like first sex, all hands and thumbs till you figure out what goes where, then it's what ever works best for you.

  2. #2
    Xtreme Mentor
    Join Date
    Mar 2007
    Posts
    2,588
    dam...

  3. #3
    Xtreme Member
    Join Date
    Apr 2005
    Location
    Melbourne, Australia
    Posts
    105
    would be interesting to hear what Steve Gibson at GRC.com thinks about it.

    If you went to the lengths of full disk encryption with super sensitive data on the computer, you probably wouldn't put it into sleep mode anyway and expose the risk of scanning the ram for encryptions keys.
    CPU Intel E8400 4.3ghz (9x478), Poseidon WCL-04 Water Cooling | RAM Crucial Ballistix Tracer PC2-8500 2x1gb | Motherboard Asus P5Q Deluxe | Graphics Card 512mb ASUS 9800GTX+ | Audio X-Fi XtremeMusic, Logitech Z-2300 | Power Supply Corsair HX620 | Case Antec 900 | Input Devices Razer ProClick, Logitech G15 | Display Device Dell UltraSharp 2408WFP, Samsung 226BW

  4. #4
    Xtreme Guru
    Join Date
    Jan 2005
    Location
    Tre, Suomi Finland
    Posts
    3,858
    This works only when the encrypted volume is mounted and accessible by any program. For example in TrueCrypt, simply dismounting the volume results in the keys being erased from RAM thus making this "exploit" impossible. TC also automatically dismounts all volumes once the user logs off or the system enters a sleep mode.

    Supercooling RAM?
    You were not supposed to see this.

  5. #5
    c[_]
    Join Date
    Nov 2002
    Location
    Alberta, Canada
    Posts
    18,728
    Nice trick cooling the ram to make it hold its information while hotswapping it.

    All along the watchtower the watchmen watch the eternal return.

  6. #6
    Xtreme Cruncher
    Join Date
    Oct 2007
    Posts
    332
    Thats some pretty cool stuff!!

  7. #7
    Xtreme Addict
    Join Date
    Apr 2006
    Posts
    2,462
    Quote Originally Posted by largon View Post
    This works only when the encrypted volume is mounted and accessible by any program. For example in TrueCrypt, simply dismounting the volume results in the keys being erased from RAM thus making this "exploit" impossible. TC also automatically dismounts all volumes once the user logs off or the system enters a sleep mode.

    Supercooling RAM?
    exactly. so they need direct access to your RAM, for instance via a trojan horse. if they have direct access to the computer while it is running and the volumes are mounted they don't even have to take a look into the RAM

    I don't see a big problem here
    Notice any grammar or spelling mistakes? Feel free to correct me! Thanks

  8. #8
    Xtreme Cruncher
    Join Date
    Oct 2007
    Posts
    332
    Well if your encrypting your hdd would you not run a decent firewall/antivirus/spyware/maleware etc. to prevent a trojan.

  9. #9
    Xtreme Addict
    Join Date
    Nov 2004
    Posts
    1,550
    I want to see this in practice on video.

  10. #10
    Xtreme Addict
    Join Date
    Apr 2006
    Posts
    2,462
    Quote Originally Posted by Jaivan View Post
    Well if your encrypting your hdd would you not run a decent firewall/antivirus/spyware/maleware etc. to prevent a trojan.
    brainwall.exe is sufficient for most cases...
    Notice any grammar or spelling mistakes? Feel free to correct me! Thanks

  11. #11
    Xtreme X.I.P.
    Join Date
    Nov 2002
    Location
    Shipai
    Posts
    31,147
    software encryption will never be 100% secure, this isnt news...
    what you need is hardware encryption

  12. #12
    Registered User
    Join Date
    Jun 2005
    Location
    Bancroft, ON, Canada
    Posts
    3,645
    Quote Originally Posted by saaya View Post
    software encryption will never be 100% secure, this isnt news...
    what you need is hardware encryption
    The problem with hardware encryption is whoever made the hardware has the key or the backdoor. IBM keys are probably not secure as they likely give them to the feds in the US anyhow. Trust no one
    "Foldin, Foldin, Foldin...keep those benchers foldin..." (Lyrics by Angra, Music is Rawhide)

    BOYCOTT MIR's

    Quote Originally Posted by Monkeywoman View Post
    aww an OC virgin! lose it tonight with Xtremesystems!!!

  13. #13
    Xtreme Enthusiast
    Join Date
    May 2006
    Location
    over the rainbow
    Posts
    964
    Quote Originally Posted by KoHaN69 View Post
    I want to see this in practice on video.
    here u go: http://www.youtube.com/watch?v=JDaicPIgn9U
    AMD Phenom II X6 1055T@3.5GHz@Scythe Mugen 2 <-> ASRock 970 Extreme4 <-> 8GB DDR3-1333 <-> Sapphire HD7870@1100/1300 <-> Samsung F3 <-> Win8.1 x64 <-> Acer Slim Line S243HL <-> BQT E9-CM 480W

  14. #14
    Registered User
    Join Date
    Jun 2006
    Posts
    53
    There aren't any known exploits to attack AES or serpent. saaya, please show some evidence that supports your theory that AES / serpent volumes created in truecrypt aren't "100% secure" short of brute force attacks.

  15. #15
    Registered User
    Join Date
    Jul 2006
    Posts
    33
    And to think I thought the weak point for all of this software encryption was the fact that really it is protected by a password.

  16. #16
    Xtreme Addict
    Join Date
    Dec 2004
    Location
    Flying through Space, with armoire, Armoire of INVINCIBILATAAAAY!
    Posts
    1,939
    Quote Originally Posted by STEvil View Post
    Nice trick cooling the ram to make it hold its information while hotswapping it.
    Also a nice trick: soldering a power supply to it in parallel. Y'know, doesn't require it to be near zero kelvin to work.
    Sigs are obnoxious.

  17. #17
    Xtreme Member
    Join Date
    Mar 2005
    Location
    Florida, USA
    Posts
    129
    Anyone know if True Crypt would store the key files coming off a USB drive in the RAM?

    Edit: Now that I think about it some more I guess it does since you can remove the drive and still have the volume open. Can someone confirm that True Crypt does in fact wipe the RAM once the volume is closed?

  18. #18
    Xtreme Addict
    Join Date
    Jun 2004
    Location
    US, Virginia
    Posts
    1,513
    I don't see such a big deal here. This isn't really news even is it? We've known how ram works forever. I'm really not too worried about someone taking the ram out of my computer, if I have data on a computer that is that sensitive and someone were able to take the ram out of it, I don't think the problem lies on the fault of the encryption.
    E8400 @ 3600mhz
    4870 @ 790/1100
    2x2GB DDR2

  19. #19
    Xtreme Guru
    Join Date
    Jan 2005
    Location
    Tre, Suomi Finland
    Posts
    3,858
    Quote Originally Posted by theystolemyname View Post
    There aren't any known exploits to attack AES or serpent. saaya, please show some evidence that supports your theory that AES / serpent volumes created in truecrypt aren't "100% secure" short of brute force attacks.
    But this exploit is not about the encryption. It's all about how encryption softwares handles the keys.

    TrueCrypt documentation states that the master key is stored unencrypted in the RAM as long as the volume is mounted.
    Inherently, unencrypted master keys have to be stored in RAM as well. When a TrueCrypt volume is dismounted, TrueCrypt erases its master keys (stored in RAM). When the computer is cleanly restarted, all TrueCrypt volumes are automatically dismounted (thus, all master keys stored in RAM are erased by the TrueCrypt driver).
    edit:
    On a completely unrelated note:
    kryptobs2000,
    I think there's an unwritten rule on internet on forums that prohibit male users from using avatars that depic males who aren't either of these:
    1. the user himself
    2. celebrity that has considerable amount of "street kred"

    Last edited by largon; 02-22-2008 at 03:08 PM.
    You were not supposed to see this.

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •