Showing posts with label takethatcryptosystems. Show all posts
Showing posts with label takethatcryptosystems. Show all posts

Wednesday, 22 October 2008

Nevermind Alice and Bob, read about S, A and H...

Right to silence is not enough, you have to give us the encryption keys:
http://www.out-law.com/default.aspx?page=9514

Friday, 22 February 2008

Mobile Phone Sniffing: smells kind of cheesey!

Apparently a couple of guys at the black hat conference over in DC have demonstrated a GSM crypto cracking system in 1/2 and hour and $1,000 of storage.
Take me >>
As dD is impoverished and busy attendendance was not an option. However, the good old blackhat folks will be making the whole things available in there archive in a couple of weeks. Groovey!

Cold Hacking: what we leave behind

It seems that DRAM is not so forgetful after all! It would seem that some plucky researchers over at Princeton have demonstrated how to obtain critical cryptographic keys for disk encryption systems such as BitLocker and TrueCrypt by cold booting a system an having a look at what is left in memory.

They even have a video of the talk and a paper. This is another example of side attacks on cryptosystems which the great might big boss Bruce has been mentioning for some time now.