secrets lying around on the HD
Per Tunedal Casual
pt at radvis.nu
Tue Apr 13 19:37:42 CEST 2004
-----BEGIN PGP SIGNED MESSAGE-----
At 15:50 2004-04-13, you wrote:
>On Tue, 13 Apr 2004 14:55:33 +0200, Per Tunedal Casual said:
>> What about virtual memory (SWAP-files) in Windows?
>That may indeed happen and we can't do anything about it. The only
>possible solution is to write a device driver and let it allocate
>memory for secrets. This memory will then be managed via ioctls.
>There is one such driver available but it is not Free Software so we
>have not looked deeper into it.
>There are currently rumors that the W32 API VirtualLock does indeed
>lock pages against paging - if this is true we will ad this to the
>next GnuPG version.
Fine. I asked all these questions because I suddenly realised that things
like e.g. choosing a safe algo is all in vane if someone easily can bypass
the encryption. By e.g. finding unencrypted keys or the encrypted file in
plaintext on the computer.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32) - GPGrelay v0.94
-----END PGP SIGNATURE-----
More information about the Gnupg-users