[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 06/10/12 22:44, tor@xxxxxxxxxxxxxxxxxx wrote:

> From:
> http://www1.informatik.uni-erlangen.de/tresorfiles/tresor.pdf
> 
> "TRESOR is only compatible with real hardware. Run- ning TRESOR as
> guest inside a virtual machine is gen- erally insecure as the
> guest?s registers are stored in the host?s main memory."
> 
> This is a serious project. They have considered many different
> styles of attack, and have included attack code. The PDF is
> comprehensive.

Also, the encryption/decryption is done using a key derived from the
password which you enter at the very beginning of boot up. Not with
the password or key you provide to cryptsetup/luks. This wasn't clear
to me when I wrote the blog post which I linked to. It's all in the PDF.

- -- 
Mike Cardwell  https://grepular.com/     http://cardwellit.com/
OpenPGP Key    35BC AF1D 3AA2 1F84 3DC3  B0CF 70A5 F512 0018 461F
XMPP OTR Key   8924 B06A 7917 AAF3 DBB1  BF1B 295C 3C78 3EF1 46B4
-----BEGIN PGP SIGNATURE-----
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=SreS
-----END PGP SIGNATURE-----
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk