On 11/08/2010 03:12 PM, Gregory Maxwell wrote:
Here is the attack: Your system is running with nice secure
encrypted
drives, no console access (or a locked screen on a laptop). The
attacker inserts a bootable USB key and hits the power switch. System
reboots into the USB key, it retrieves the cryptographic keys for
reading your disk from memory, then copies whatever information it
likes.
Only if the laptop is configured to boot from the USB. But I know,
everything here is theoretical.
RR