Many people think of security and privacy as two different concepts, which is true, but many times when referring to the internet they go hand in hand. When a lot of people talk about their privacy on the internet they also are referring to security, or vice versa. Security Security has been a concern ever since the Stone Ages. The only difference is that we now have the internet to take into account. Security on the internet is a hard problem to solve primarily because the internet protocol suite (TCP/IP) was not built with security in mind. Back in
Read More
Archives for Encryption
Cold Boot Attacks
Some of you might have heard about an attack called a cold boot attack. This attack is a side channel attack that is performed by stealing the encryption keys out of a systems DRAM and/or SRAM that has an encrypted hard drive. How It Works A cold boot attacks are pretty simple to preform, but for the group of people who figured it out, it was no walk in the park. The reason cold boot attacks work is because usually none of the information that is stored in your RAM is encrypted and therefore the attackers are able to gain
Read More
Information Technology, IT Security, and Preston Hood.
Bitlocker, Cold Boot Attack, Cryptography, dm-crypt, DRAM, Encryption, File Vault, RAM, SRAM, and TrueCrypt.
Bitlocker, Cold Boot Attack, Cryptography, dm-crypt, DRAM, Encryption, File Vault, RAM, SRAM, and TrueCrypt.