>2016
>people still believing in ecnryption
"There are products such as Passware Kit Forensic that can within an hour decrypt hard drives encrypted using BitLocker, FileVault and TrueCrypt. It can also recover passwords for PGP virtual disks and Mac keychain files. It doesn't 'break' the encryption, it does a memory dump to extract the keys while the user is logged in. This type of attack has been known for a long while and doesn't work if you power off rather than leave the computer in sleep mode, or dismount the volume."
Helso there, Mr. NSA FUD operative
>>53901512
>doesn't work if you power off
>2016
>people still using sleep modes when ssds boot up in mere seconds
>sage for shitpost
Oh wow stop the presses.
Your data is compromised when the attacker got physical access to your device.
This is big news guys
big news
biiigggggggggggggggggggg news
>>53901620
b-but... muh 256 AES
>>53901512
Isn't there a kernel patch that keeps your keys in the debug registers of your cpu, preventing some of these attacks?
>>53901512
>It doesn't 'break' the encryption, it does a memory dump to extract the keys while the user is logged in.
>it does a memory dump to extract the keys while the user is logged in.
>while the user is logged in.
>logged in.
Peoples can owns my box while i loged in?
>ids-habbening.png