Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Freeze the CPU (Score 2, Informative) 260

Except that real "trusted computing" using a TPM chip doesn't store the key in the CPU or in RAM, it is stored in the TPM.

This is a dangerous belief. It is true that some keys remain inside the TPM, at least as long as the chip is being accessed only through its wire interface. However, the TPM ist not suitable for bulk encryption. Applications therefore typically use the TPM only to store keys, which are extracted to memory when needed.

Comment Re:Adds another layer to hardware solutions? (Score 1) 260

The attack essentially depends on being able to shutdown the computer but keep the memory cold enough that the randomization time is slowed down tremendously, giving enough time to perform a dump of the contents onto another system for further analysis.

The attack is really extracting the encryption key from memory after gaining physical access to the machine. Cold boot, cool as it may be, is just one particular implementation of it. To effectively protect your system you should defend against the attack, not particular implementations.

Comment Re:Adds another layer to hardware solutions? (Score 1) 260

I thought Slashdot was against the TPM chip? Last I read, it was supposed to be used for anti-piracy.

Further down (or up?) the thread, Slashdot still is. But a TPM is not going to help you much here. The TPM is not supposed to do bulk encryption so it is typically used to restrict the release of a key to certain conditions. Which means that even with a TPM one will end up having the actual key somewhere in the RAM.

Comment Re:how often are these actaully done? (Score 1) 260

so how often are these cold boot attacks actually performed in a hostile situation (as opposed to under controled conditions for demonstration, or to legitimately recover lost passwords or whatever)

This is a good and legitimate question. This question should not be used to thwart research, however. Threats may evolve and exploiting a vulnerability could become widespread over time. Perhaps deployment can wait until this really happens but research should not.

Comment Re:zero on power up? (Score 1) 260

Isn't it possible to design "secure" memory chips that zero their contents when power is first applied?

Maybe, but this would solve only one portion of the problem. Cold boot attacks imply that the attacker has physical access to the computer and sufficient time to dig down to the wires without getting caught. The canonical implementation is stealing a running laptop. The attacker's objective is to get access to a key, which today usually resides in RAM. Cold boot attacks are one way of doing this but there is a wide range of other things that an attacker could do in this situation. The attacker might use interfaces like Firewire for instance, which has been mentioned elsewhere in this discussion. Or manipulate the running system in such a way that power suppply of the RAM chips is maintained while other components are being reset. "Secure" memory chips as you propose would therefore solve only part of the real problem.

Comment Re:Only needed when the machine is locked (Score 1) 260

The scenario is that someone steals a running, but locked laptop, and wants to read your encryption keys stored in RAM. If it's not running, then the encryption keys aren't in RAM.

This is, by the way, only the easier part of the threat landscape. If the computer is not running, nothing prevents an attacker from tampering with the hardware or software in such a way that a second visit to the system yields any password or key used.

Cellphones

Submission + - SPAM: Garmin Nuvifone: iPhone wannabee or breakthrough p

WirePosted writes: "The airwaves are buzzing with news of yet another iPhone challenger, the Garmin Nuvifone, a touchscreen handheld that attempts to bring together the best of GPS navigation and phone functions, with web browsing and entertainment thrown in. The Nuvifone is not slated for release until Q3 but everything about it from its 3.5 inch touch screen menu based display to the way users place calls smacks of iPhone copy. That said, the Nuviphone does promise to deliver a number of things not available on the iPhone — yet."
Link to Original Source
Graphics

Submission + - Nice Cameras Not Allowed

Hugh Pickens writes: "NY Times columnist David Pogue had an interesting post on his blog a few days ago on the prohibition of DSLR cameras (Single Lens Reflex with Detachable Lens) at many concerts, shows, and arenas while pocket cameras are allowed in. Pogue brought his Nikon D80 to a freestyle motocross show and was turned away — the tour had been running into trouble with people shooting the events with professional equipment and then showing up at the next venue to sell prints. "Most outfits would simply have banned all photography," says Pogue. "These guys at least knew that only an SLR is capable of sell-worthy photos." As an amateur photographer who likes to take concert photos and put them into the creative commons I wonder (along with Pogue) if concert signs of the future will one day say "No Photography with Nice Cameras Allowed.""
Programming

Apple Crippled Its DTrace Port 476

Linnen writes in to note that one of developers of Sun's open source system tracing tool, DTrace, has discovered that Apple crippled its port of the tool so that software like iTunes could not be traced. From Adam Leventhal's blog: "I let it run for a while, made iTunes do some work, and the result when I stopped the script? Nothing. The expensive DTrace invocation clearly caused iTunes to do a lot more work, but DTrace was giving me no output. Which started me thinking... did they? Surely not. They wouldn't disable DTrace for certain applications. But that's exactly what Apple's done with their DTrace implementation. The notion of true systemic tracing was a bit too egalitarian for their classist sensibilities..."
Space

The Secret of the Sun's Heated Atmosphere 158

eldavojohn writes "There has long been speculation on why the Sun's surface is a mere ten thousand degrees while the atmosphere can reach millions. Space.com is reporting that the mystery has now been solved. Researchers looked for Alfven waves in the solar chromosphere and found them. Followup studies employing simulations demonstrated that the energetics work out to transfer energy from the Sun's surface to its overlying corona.. The magnetic waves may also be the power source behind the solar wind."
PC Games (Games)

Free 'Ad-Backed' Games the Future? 59

MacarooMac writes "EA Games recently announced they are to release a free online version of their PC game 'Battlefield Heroes', supported by in game adverts and micro payments. EA hopes the model of a free game as a download that is supported by advertising could be applied to other franchises it owns. For this particular title, no adverts will appear in the game itself due to incompatibility with the game's fictional world. Instead, adverts will appear on the website and the 'front-end' of the game. But many other titles can and do provide for product placement during game play itself. How long before improvements in video graphics, combined with dynamic, and perhaps even interactive in-game advertising, start to generate revenue increases that enable publishers to substantially reduce the price of their games?" Already a very common model for Eastern online titles, and being adapted here in the states by a number of companies.
Science

Global Warming Exposes New Islands in the Arctic 645

circletimessquare writes "The New York Times has a sobering article about the rapidly accelerating pace of glacial melting across the arctic, focusing on the discovery of new islands and the fact that this is occurring far faster than climate scientist's models predict. What were called Nunataks or 'lonely mountains' in Inuit, trapped in the ice, only a few years ago, are now in the open ocean by kilometers. Off of Greenland, what was known previously as peninsulas have been revealed to be islands as the ice retreats. Dennis Schmitt, a modern day explorer and discoverer of one of these new islands and fluent in Inuit, has named it Uunartoq Qeqertoq: the warming island."
Linux Business

Submission + - Alan Cox files patent for DRM

booooh writes: "Alan Cox has filed a patent for DRM (Digital Rights Management).
http://www.freshpatents.com/Rights-management-syst em-dt20050623ptan20050138406.php
A rights management system monitors and controls use of a computer program to prevent use that is not in compliance with acceptable terms.
The nice things about this are:
  1. According to Red Hat's patent pledge they will not license this technology if the patent is granted, but rather will probably sue to avoid others using it.
  2. It can probably be applied to the DRM that is in Vista...
see more details at: http://www.linuxquestions.org/questions/showthread .php?p=2574359"

Slashdot Top Deals

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...