Via
schneier:
hard disk encryption can be defeated by chilling RAM chips.
Commentary from the Institute of Physics: the stated motives for shooting down the satellite were implausible, and
it's not a decent test for shooting down an ICBM. It's impressive progress in missile defence, but it's not yet time for anyone to
crow about it.
Comments 13
Replace the RAM cover on your laptop with non-standard screws? By the time someone digs through their toolkit to find the right driver, the data will be gone.
Or get a small program that overwrites the area of RAM in question with random data before shutdown.
Neither of course stop the situations where the laptop has been aquired in a powered-on state and can be hard-reset, skipping proper shutdown (but then if they have it live, it may well be logged in anyway). Or if they have the cover off in advance of shutdown.
Reply
Try to take the case apart with the computer still powered-up: contact closes and shoves +12V into places-where-there-should-only-be-five, thereby releasing the Magic Smoke™ from the DRAM along with any stored cryptokeys.
Reply
Reply
Yeah, and transparently so. Was the NSA Pentagon really dumb enough to think anyone would believe it?
Reply
Fortunately, though, I'm not China and I don't have any big, red buttons.
Reply
Reply
Reply
If I'd been evil I would have suggested shooting down the US anti-satellite missile.
Reply
For example, expose an attacker attempting to gain unauthorized physical access to the risk of serious injury.
Reply
Reply
I will leave speculation on exactly how many armed employees guard our data centre as an exercise for the reader.
Reply
On the other hand, the chap who comes to take your computer is typically waving a warrant, and the stakes have to be pretty high before it's worth waving guns back at him. Physical security won't help your average bent accountant or bonsai-kitten-hentai merchant.
Reply
Leave a comment