Hi Chris,
Chris wrote (26 Dec 2011 10:05:27 GMT) :
> I understand what cold boot attack is although what is this suppose
> to protect against exactly? Is it dismount encrypted drive and wipe
> after x seconds of inactivity? If the system loses power wouldn't
> the attack still work since you couldn't have wiped it? Or is it
> that through the use of registers you are avoiding storing it in
> memory and are wiping that memory which is initially used?
> The question then I would think becomes can you recover from the key
> from the registers.
If you're interested in that level of detail,
please start by reading our specification and design document:
https://tails.boum.org/contribute/design/
Cheers,
--
intrigeri <intrigeri@???>
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| The impossible just takes a bit longer.