secrets lying around on the HD
Per Tunedal Casual
pt at radvis.nu
Tue Apr 13 19:37:42 CEST 2004
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 15:50 2004-04-13, you wrote:
>On Tue, 13 Apr 2004 14:55:33 +0200, Per Tunedal Casual said:
>
>> What about virtual memory (SWAP-files) in Windows?
>
>That may indeed happen and we can't do anything about it. The only
>possible solution is to write a device driver and let it allocate
>memory for secrets. This memory will then be managed via ioctls.
>There is one such driver available but it is not Free Software so we
>have not looked deeper into it.
>
>There are currently rumors that the W32 API VirtualLock does indeed
>lock pages against paging - if this is true we will ad this to the
>next GnuPG version.
>
> Werner
Fine. I asked all these questions because I suddenly realised that things
like e.g. choosing a safe algo is all in vane if someone easily can bypass
the encryption. By e.g. finding unencrypted keys or the encrypted file in
plaintext on the computer.
Per Tunedal
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32) - GPGrelay v0.94
iD8DBQFAfCV2ITLMlZFNlMoRAoa7AJ9MznZ1i0YOeNRl+8JgV9JM/uyF4gCgiJu4
nKZPeA7JOLnut+5ejGCE+iM=
=F3ET
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list