Talk:Cold boot attack

From Wikipedia, the free encyclopedia

WikiProject on Cryptography This article is part of WikiProject Cryptography, an attempt to build a comprehensive and detailed guide to cryptography on Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks.

I think there should be a criticisms section. I know a lot of debate has been going on about this in the crypto community. Especially the TrueCrypt forums. —Preceding unsigned comment added by 65.65.222.162 (talk) 08:57, 9 May 2008 (UTC)

[edit] False information?

Coreect me if I'm wrong - but doesn't TPM use hardware? However, this article claims that this is a problem with hardware, therefore TPM is weak. Does this imply that TPM is not hardware? It seems to me that this is inaccurate information.  —CobraA1 05:08, 19 March 2008 (UTC)

No, the hardware that the problem is with is the memory, not the TPM. Socrates2008 (Talk) 06:02, 19 March 2008 (UTC)
Forgive me for being dense - but if the key is stored on the TPM rather than in memory, then how do they find the key?  —CobraA1 20:55, 19 March 2008 (UTC)
Unfortunately, you've got to retrieve the key from the TPM at some point and use it. (Decryption/encryption occurs in memory) Socrates2008 (Talk) 21:04, 19 March 2008 (UTC)
Okay, thanks for the clarification.  —CobraA1 21:25, 19 March 2008 (UTC)