Log in

No account? Create an account
A Solution to the Cold Boot Attack - NIHIL VEL PERTINAX SUM — LiveJournal
The Web Log of Linuxrocks123

Date: 2011-04-23 22:40
Subject: A Solution to the Cold Boot Attack
Security: Public
Here's a good paper on a solution the cold boot attack. Instructions on how to use it are here.

Post A Comment | 3 Comments | | Link

User: Jonas Andersson
Date: 2012-10-12 21:15 (UTC)
Subject: (no subject)

I think this post, and the Loop-Amnesia software, is wonderful news for everyone that doesn't happen to have an Intel processor compatible with AES-NI instruction set. I'm using a laptop with such a processor, so after having read a great guide (https://grepular.com/Protecting_a_Laptop_from_Simple_and_Sophisticated_Attacks) about how to avoid cold boot attacks, I got a bit disappointed when I realized that I can't use TRESOR. Didn't take much for me to discover Loop-Amnesia as an alternative, though, and I thank you for the time and effort you've put into the software. But to be honest I'm not capable of setting everything up to run smoothly. I'm thinking about installing Fedora or Ubuntu 12.04 with FDE, but have no clue as to how I should configure my kernel for Loop-AES. Can't say that I think I will manage any of the other seven steps either (well, nr. 1 is pretty straightforward so even I can do that). Would be great if you could add a document or something to this post that describes every step of the process to protect against cold boot attacks. Maybe it's too much to ask of you, but I'm hoping that you are familiar enough with every step to be able to describe it without to much effort or research.

Best wishes,


PS. If you prefer to e-mail instructions instead of posting them here, it works just as fine for me. DS.
Reply | Thread | Link

my journal
May 2016