192

An attacker with physical access can abruptly restart the device and dump RAM, as analysis of this memory may reveal FVEK keys from recently running Windows instances, compromising data encryption.

The effectiveness of this attack is, however, limited because the data stored in RAM degrades rapidly after the power is cut off.

you are viewing a single comment's thread
view the rest of the comments
[-] stoy@lemmy.zip 76 points 2 days ago

Bitlocker is designed to aid against phyiscal attacks, so physical access is a given.

[-] sus@programming.dev 10 points 1 day ago* (last edited 1 day ago)

the best you can ever do is make physical attacks more inconvenient, and it succeeds at that.

Here's another "critical vulnerability": the attacker can insert a physical device to intercept all keystrokes, and steal the key whenever the user enters it. A hidden camera can also accomplish this

this post was submitted on 06 Jan 2025
192 points (99.5% liked)

Cybersecurity

5916 readers
166 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS