Home > computer, software > Bypassing FileVault and BitLocker security

Bypassing FileVault and BitLocker security

padlockThe latest security flaw to Mac OS and Windows is revealed in an article I found on ZDNet today. Microsoft’s BitLocker, Apple’s FileVault and the open-source TrueCrypt are all rendered insecure because memory contents are not deleted when the computer is rebooted. Sounds pretty scary until you read the rest of the article. To achieve this feat you need to supercool the memory cards and transfer them to another computer, or follow a long and involved procedure using specially developed software and lots of technical knowledge.
Transferring memory to another computer is not difficult, but won’t much of the memory be overwritten when the recipient computer boots? And as for the other method using another computer attached via ethernet cable and network booting the mac, using an open firmware password will block this. The other point worth mentioning is that the Windows version used was Vista, but the Mac OS was Tiger. Is Leopard still vulnerable to this type of attack?

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: