secrets lying around on the HD

Per Tunedal Casual pt at radvis.nu
Tue Apr 13 19:37:42 CEST 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 15:50 2004-04-13, you wrote:
 >On Tue, 13 Apr 2004 14:55:33 +0200, Per Tunedal Casual said:
 >
 >> What about virtual memory (SWAP-files) in Windows?
 >
 >That may indeed happen and we can't do anything about it.  The only
 >possible solution is to write a device driver and let it allocate
 >memory for secrets.  This memory will then be managed via ioctls.
 >There is one such driver available but it is not Free Software so we
 >have not looked deeper into it.
 >
 >There are currently rumors that the W32 API VirtualLock does indeed
 >lock pages against paging - if this is true we will ad this to the
 >next GnuPG version.
 >
 >  Werner

Fine. I asked all these questions because I suddenly realised that things
like e.g. choosing a safe algo is all in vane if someone easily can bypass
the encryption. By e.g. finding unencrypted keys or the encrypted file in
plaintext on the computer.
Per Tunedal

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32) - GPGrelay v0.94

iD8DBQFAfCV2ITLMlZFNlMoRAoa7AJ9MznZ1i0YOeNRl+8JgV9JM/uyF4gCgiJu4
nKZPeA7JOLnut+5ejGCE+iM=
=F3ET
-----END PGP SIGNATURE-----




More information about the Gnupg-users mailing list