{"id":96,"date":"2008-03-06T14:05:54","date_gmt":"2008-03-06T12:05:54","guid":{"rendered":"http:\/\/blog.robinward.com\/?p=96"},"modified":"2013-08-15T15:18:20","modified_gmt":"2013-08-15T14:18:20","slug":"attacks-on-disk-encryption-keys","status":"publish","type":"post","link":"https:\/\/robinward.com\/?p=96","title":{"rendered":"Attacks on disk encryption keys"},"content":{"rendered":"<p>A Princeton computer scientist team has released a white paper which documents their cold boot attacks on encryption keys. The scenarios are based on a key recovery involving primarily  laptop computers  using  various methods  to keep the key stored in dram on a power off.<\/p>\n<p>Very interesting article and a guideline on preventing attacks like this. The most effective way is certainly limiting boot options in order do prevent anyone booting up tools to steal your encryption key.<\/p>\n<p><a href=\"http:\/\/citp.princeton.edu.nyud.net\/pub\/coldboot.pdf\" target=\"_blank\">http:\/\/citp.princeton.edu.nyud.net\/pub\/coldboot.pdf<\/a><br \/>\n<a href=\"http:\/\/www.securiteam.com\/securityreviews\/5GP0N1FNFU.html\" target=\"_blank\">SecuriTeam Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Princeton computer scientist team has released a white paper which documents their cold boot attacks on encryption keys. The scenarios are based on a key recovery involving primarily laptop computers using various methods to keep the key stored in dram on a power off. Very interesting article and a guideline on preventing attacks like &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/robinward.com\/?p=96\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Attacks on disk encryption keys&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-96","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/posts\/96","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/robinward.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=96"}],"version-history":[{"count":1,"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/posts\/96\/revisions"}],"predecessor-version":[{"id":770,"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/posts\/96\/revisions\/770"}],"wp:attachment":[{"href":"https:\/\/robinward.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/robinward.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/robinward.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}