Right to silence is not enough, you have to give us the encryption keys:
http://www.out-law.com/default.aspx?page=9514
We feel passionate about most things related to computer security: Links, news, articles, research papers, etc...
Showing posts with label takethatcryptosystems. Show all posts
Showing posts with label takethatcryptosystems. Show all posts
Wednesday, 22 October 2008
Friday, 22 February 2008
Mobile Phone Sniffing: smells kind of cheesey!
Apparently a couple of guys at the black hat conference over in DC have demonstrated a GSM crypto cracking system in 1/2 and hour and $1,000 of storage.
Take me >>
As dD is impoverished and busy attendendance was not an option. However, the good old blackhat folks will be making the whole things available in there archive in a couple of weeks. Groovey!
Take me >>
As dD is impoverished and busy attendendance was not an option. However, the good old blackhat folks will be making the whole things available in there archive in a couple of weeks. Groovey!
Cold Hacking: what we leave behind
It seems that DRAM is not so forgetful after all! It would seem that some plucky researchers over at Princeton have demonstrated how to obtain critical cryptographic keys for disk encryption systems such as BitLocker and TrueCrypt by cold booting a system an having a look at what is left in memory.
They even have a video of the talk and a paper. This is another example of side attacks on cryptosystems which the great might big boss Bruce has been mentioning for some time now.
They even have a video of the talk and a paper. This is another example of side attacks on cryptosystems which the great might big boss Bruce has been mentioning for some time now.
Subscribe to:
Posts (Atom)