Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"Sleeping" laptops get stolen too; this might slightly help. That said, this is a cool hack, not the greatest protection ever.

Full-disk encryption (on a machine turned off at the time) is, I believe, typically considered sufficient protection. Consult a lawyer in your local jurisdiction, though.




That's my main reason for using suspend-to-disk instead of suspend-to-ram.

With suspend-to-disk Linux allows me to save the RAM image to the encrypted harddisk. With suspend-to-ram it would be pretty easy to work around the encryption.


Right, but suspend-to-disk doesn't really mitigate cold boot attacks, because in order to suspend your data to disk, an AES key is loaded into DRAM. The "cold" in "cold boot" refers to the tricks researchers use to extract data from DRAM even after reboot.

The point of this research is that there aren't (that we know of) "cold register" attacks that extract prior contents of CPU registers.


Right, cold boot attacks would also apply to suspend-to-disk. But currently I do not really worry about this scenario, as it seems that cold boot attacks are only feasible if you get access to the hardware within several minutes after it has been powered down.


Sure. If you don't care about cold-boot attacks, you don't care about this research. I think it's interesting, but it doesn't keep me up at night.


Offtopic: Btw, does someone know why the "reply" links are missing on some posts (such as the parent post)? Is this a bug? At least it works when "manually" opening the respective URL for a reply.


There is a deliberate delay on replies in deeply-nested threads, as a damper on flame wars.


You can still reply via the 'link' button, though.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: