Remember that cold boot encryption attack we talked about last week? Looks like someone went out and released a public tool that replicates part of the functionality of the Princeton tool. I thought it would take a little longer; guess I was wrong. Does this change my advice? Not really- your best bet is still to maintain physical control of your laptop, and the odds are still pretty low you’ll have to deal with this in the real world. But keep asking your vendors how you need to configure your encryption product to limit the attack. Still, I’m always impressed with how quickly those Internets are able to recreate this stuff; talk about the end of security by obscurity. It’s almost as if there are an infinite number of really smart monkeys out there with computer science degrees.Thanks to Hack A Day for the link…

Share: