Abstract Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.
It's nasty stuff.Also, if (serious) law enforcement is coming after you, they have ways to move your computer without turning it off - basically attaching an UPS on the go, doing some wire cutting etc.-f0dder (July 20, 2008, 05:19 PM)
It's nasty stuff.Also, if (serious) law enforcement is coming after you, they have ways to move your computer without turning it off - basically attaching an UPS on the go, doing some wire cutting etc.-f0dder (July 20, 2008, 05:19 PM)That's why one of my HDs is actually a disguised thermite charge.....the moment anyone tries to access using the magic word, ('dir'), it ignites and slags the whole computer -4wd (July 20, 2008, 08:26 PM)
These days, that could unfortunately be distilled to...[Select]{IF} (living_on_earth)=(TRUE) (YOU)=((SCREWED)*(BIGTIME))-f0dder (July 28, 2008, 10:31 AM)
But the best optimization:{IF} (living_on_earth)=(42-Shades (July 28, 2008, 09:45 PM)
But the best optimization:{IF} (living_on_earth)=(42-Shades (July 28, 2008, 09:45 PM)But only if 42=FNORD -40hz (July 28, 2008, 09:49 PM)
Travelers' Laptops May Be Detained At BorderNo Suspicion Required Under DHS PoliciesBy Ellen NakashimaWashington Post Staff WriterFriday, August 1, 2008; Page A01Federal agents may take a traveler's laptop or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed.Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement.
Game over (for now). Travelers' Laptops May Be Detained At BorderNo Suspicion Required Under DHS Policies-40hz (August 02, 2008, 12:00 AM)
Travelers' Laptops May Be Detained At BorderNo Suspicion Required Under DHS Policies
The policies cover "any device capable of storing information in digital or analog form," including hard drives, flash drives, cell phones, iPods, pagers, beepers, and video and audio tapes. They also cover "all papers and other written documentation," including books, pamphlets and "written materials commonly referred to as 'pocket trash' or 'pocket litter.' "-http://www.washingtonpost.com/wp-srv/content/article/2008/08/01/laptops.html
Game over (for now). Travelers' Laptops May Be Detained At BorderNo Suspicion Required Under DHS PoliciesBy Ellen NakashimaWashington Post Staff WriterFriday, August 1, 2008; Page A01Federal agents may take a traveler's laptop or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed.Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement.Full article at: http://www.washingto...8/08/01/laptops.html-40hz (August 02, 2008, 12:00 AM)
U.S. Government Policy for Seizing Laptops at BordersAmazing. The U.S. government has published its policy: they can take your laptop anywhere they want, for as long as they want, and share the information with anyone they want: Federal agents may take a traveler's laptop or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed. Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption, or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, US Customs and Border Protection and US Immigration and Customs Enforcement. [...] DHS officials said that the newly disclosed policies — which apply to anyone entering the country, including US citizens — are reasonable and necessary to prevent terrorism. [...] The policies cover 'any device capable of storing information in digital or analog form,' including hard drives, flash drives, cell phones, iPods, pagers, beepers, and video and audio tapes. They also cover 'all papers and other written documentation,' including books, pamphlets and 'written materials commonly referred to as "pocket trash..."
Federal agents may take a traveler's laptop or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed. Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption, or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, US Customs and Border Protection and US Immigration and Customs Enforcement. [...] DHS officials said that the newly disclosed policies — which apply to anyone entering the country, including US citizens — are reasonable and necessary to prevent terrorism. [...] The policies cover 'any device capable of storing information in digital or analog form,' including hard drives, flash drives, cell phones, iPods, pagers, beepers, and video and audio tapes. They also cover 'all papers and other written documentation,' including books, pamphlets and 'written materials commonly referred to as "pocket trash..."
Sam Brownback is outraged that the Chinese government would spy on foreigners on its soil without a warrant. When it was pointed out to him that the United States government is now authorized to conduct warrantless spying in the United States, he had this to say: [read the article]
I wonder what's the true proportion of people experiencing laptop "confiscation".-Armando (August 02, 2008, 08:54 PM)