{"id":20,"date":"2008-03-04T08:40:05","date_gmt":"2008-03-04T12:40:05","guid":{"rendered":"http:\/\/schollnick.info\/wordpress\/2008\/03\/04\/bootable-flash-key-makes-disk-encryption-attacks-super-simple\/"},"modified":"2011-03-04T20:43:16","modified_gmt":"2011-03-05T01:43:16","slug":"bootable-flash-key-makes-disk-encryption-attacks-super-simple","status":"publish","type":"post","link":"http:\/\/www.schollnick.net\/wordpress\/2008\/03\/bootable-flash-key-makes-disk-encryption-attacks-super-simple\/","title":{"rendered":"Bootable flash key makes disk encryption attacks super-simple"},"content":{"rendered":"<p>From Engadget&#8230;  (Which got it from hack a day)<\/p>\n<p><a href=\"http:\/\/www.engadget.com\/2008\/03\/04\/bootable-flash-key-makes-disk-encryption-attacks-super-simple\/#comments\">Bootable flash key makes disk encryption attacks super-simple<\/a>: &#8220;<\/p>\n<p>Filed under: <a href=\"http:\/\/www.engadget.com\/topics\/desktops\/\" rel=\"tag\">Desktops<\/a>, <a href=\"http:\/\/www.engadget.com\/topics\/laptops\/\" rel=\"tag\">Laptops<\/a>, <a href=\"http:\/\/www.engadget.com\/topic\/storage\/\" rel=\"tag\">Storage<\/a><\/p>\n<div align=\"center\"><a href=\"http:\/\/www.mcgrewsecurity.com\/tools\/msramdmp\/\"><img vspace=\"4\" hspace=\"4\" border=\"0\" alt=\"\" src=\"http:\/\/www.schollnick.net\/wordpress\/wp-content\/uploads\/2008\/03\/3-3-08-mcgrew.jpg\" \/><\/a><\/div>\n<p>Ruh roh, Shaggy &#8212; you remember that <a href=\"http:\/\/www.engadget.com\/2008\/02\/21\/cold-boot-disk-encryption-attack-is-shockingly-effective\/\">disk encryption attack<\/a> that involved cooling off your target&#8217;s RAM and yanking it to get a bitdump before the contents faded? Well, it looks like things just got a lot simpler for would-be attackers &#8212; check out this USB flash key designed by security researcher Robert Wesley McGrew, which can boot your machine and dump the RAM to itself without altering its contents. That means you no longer need to actually pull the DIMMs or carry around an air duster; all an attacker needs is enough time to reboot your machine and copy the contents of your RAM. Of course, that takes time &#8212; McGrew says things are running quite slowly right now, but he suspects his test machine is dropping down to USB 1.0 speeds. That&#8217;s still not too reassuring &#8212; looks like we&#8217;ll be spending even more time with our machines from now on.<\/p>\n<p>[Via <a href=\"http:\/\/hackaday.com\/2008\/03\/03\/bootable-usb-ram-capture\/\">Hack a Day<\/a>]<\/p>\n<p>(Via <a href=\"http:\/\/www.engadget.com\">Engadget<\/a>.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From Engadget&#8230; (Which got it from hack a day) Bootable flash key makes disk encryption attacks super-simple: &#8220; Filed under: Desktops, Laptops, Storage Ruh roh, Shaggy &#8212; you remember that disk encryption attack that involved cooling off your target&#8217;s RAM and yanking it to get a bitdump before the contents faded? Well, it looks like <a class=\"read-more\" href=\"http:\/\/www.schollnick.net\/wordpress\/2008\/03\/bootable-flash-key-makes-disk-encryption-attacks-super-simple\/\">[&hellip;]<\/a><\/p>\n","protected":false},"author":2,"featured_media":4925,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[12,23],"tags":[1838],"_links":{"self":[{"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/posts\/20"}],"collection":[{"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":0,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/posts\/20\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/media\/4925"}],"wp:attachment":[{"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/media?parent=20"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/categories?post=20"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/tags?post=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- WP Super Cache is installed but broken. The constant WPCACHEHOME must be set in the file wp-config.php and point at the WP Super Cache plugin directory. -->