Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Cold Boot Attacks

Name: Anonymous 2018-09-14 18:01

https://arstechnica.com/gadgets/2018/09/cold-boot-attacks-given-new-life-with-firmware-attack/
Hacking is getting weirder and weirder. Another reminder that if someone has physical access to your machine, it's not secure.

Name: Cudder !cXCudderUE 2018-09-15 3:31

Zeroing out a few GB of system memory would add a little time to the boot process—a Skylake processor, for example, can only zero out about 20-30GB per second, depending on exact memory speed, so in typical configurations this could add a quarter, perhaps even as much as a half a second to the system's boot time—so MOR was added so that the delay could be avoided

Anyone who remembers sitting through the memory test on a 33MHz 486 server with 256MB of RAM would agree. Give me freedom and performance over security.

Name: Anonymous 2018-09-15 16:36

The industry response to this attack was to make the system wipe memory early on in the boot process. This doesn't help if someone wants to move the chips to a different machine, but in systems with soldered-down memory it should protect against rebooting into a different operating system and dumping memory that way: by the time the different operating system is loaded, the memory has already been wiped, leaving nothing to dump.
What on earth, this is dumb as hell. They expect the attackers own machine to work against them? How about a government agency? I can guarantee that this will not happen.
How about stop buying shitty DRAMs.

Name: Anonymous 2018-09-15 16:44

>>3
DRAM is also susceptible to another kind of attack: rowhammer

Don't change these.
Name: Email:
Entire Thread Thread List