[tor-talk] [tor-dev] resistance to rubberhose and UDP questions

tor at lists.grepular.com tor at lists.grepular.com
Sat Oct 6 19:37:21 UTC 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 06/10/12 19:24, grarpamp wrote:

>> *Anyone* with *any* access to the data centers that host the
>> directory authorities is potentially subject to either a coercive
>> or subversive
>> 
>> As you know, I've been digging down the rabbit hole of how to
>> ensure the integrity of a remote machine, and it seems impossible
>> to do this without both secure boot *and* a way to verify the
>> current runtime integrity.
> 
> You can cold boot for OS fs crypto keys

FYI, if you use TRESOR/Trevisor, you can protect your OS encryption
keys from cold boot attacks:

http://www1.informatik.uni-erlangen.de/tresor

The basic idea being that your keys are shifted from RAM into the
debug registers of the CPU on boot, then all future crypto is done
directly on the CPU (AES-NI) without the keys re-entering RAM.

Of course, you will probably still have other sensitive data in RAM.

(I use this patch on my Ubuntu laptop)

- -- 
Mike Cardwell  https://grepular.com/     http://cardwellit.com/
OpenPGP Key    35BC AF1D 3AA2 1F84 3DC3  B0CF 70A5 F512 0018 461F
XMPP OTR Key   8924 B06A 7917 AAF3 DBB1  BF1B 295C 3C78 3EF1 46B4
-----BEGIN PGP SIGNATURE-----
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=H8GX
-----END PGP SIGNATURE-----


More information about the tor-talk mailing list