Disk encryption may not be secure enough, new research finds

Isto já tem uma semana. Como ninguém abre tópico, abro eu :P
Computer scientists have discovered a novel way to bypass the encryption used in programs like Microsoft's BitLocker and Apple's FileVault and then view the contents of supposedly secure files.
In a paper (PDF) published Thursday that could prompt a rethinking of how to protect sensitive data, the researchers describe how they can extract the contents of a computer's memory and discover the secret encryption key used to scramble files. (I tested these claims by giving them a MacBook with FileVault; here's a slideshow.)
"There seems to be no easy remedy for these vulnerabilities," the researchers say. "Simple software changes are likely to be ineffective; hardware changes are possible but will require time and expense; and today's Trusted Computing technologies appear to be of little help because they cannot protect keys that are already in memory. The risk seems highest for laptops, which are often taken out in public in states that are vulnerable to our attacks. These risks imply that disk encryption on laptops may do less good than widely believed."
The nine researchers listed on the paper include San Francisco-area programmers Jacob Appelbaum and Seth Schoen and a team of Princeton University computer scientists such as graduate students J. Alex Halderman and Nadia Heninger and professor Ed Felten. The paper is titled "Lest We Remember: Cold Boot Attacks on Encryption Keys."
Ler o resto aqui -> http://www.news.com/8301-13578_3-9876060-38.html?tag=bl


Basicamente (e pelo que li noutros sitios), se usas bitelock, filevault ou dmcrypt então o perigo de conseguirem ler informação dos teus discos é real. É também possivel que existam mais sistemas vulneráveis, tendo em conta que o método de recuperação das chaves consiste em vasculhar a RAM.
 
Back
Topo