Prosecution based on memory forensics

David Tomaschik david at systemoverlord.com
Thu Jan 13 16:40:42 CET 2011


On Thu, Jan 13, 2011 at 9:00 AM, Werner Koch <wk at gnupg.org> wrote:

> On Thu, 13 Jan 2011 12:23, johanw at vulcan.xs4all.nl said:
>
> > For Windows, TrueCrypt has a free open source solution to this in the
> > form of system encryption.
>
> Does not help.  Despite that we talked about hibernation, most users
> don't use S4 (Suspend-to-Disk) but the system goes into S3
> (Suspend-to-RAM) when you close the lid.  Better systems then proceed to
> S4 only when the battery gets too low.
>
> Reading out a powered RAM (S3) might be complicated for the home user
> but not for a lab.
>
>
> Shalom-Salam,
>
>   Werner
>
> As usual, it all depends on your threat model. If you're really paranoid,
don't use gpg-agent.  :)

-- 
David Tomaschik, RHCE, LPIC-1
GNU/Linux System Architect
GPG: 0x5DEA789B
david at systemoverlord.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20110113/a2f08525/attachment.htm>


More information about the Gnupg-users mailing list