hardware-level phishing attack - bypassing Microsoft Bitlocker
stephens316
Member Posts: 203 ■■■■□□□□□□
in Off-Topic
______________
Current Studying : GPEN |GCNF|CISSP??
Current Reading : CISSP| CounterHack|Gray Hat Hacking
Completed 2019 : GCIH
Free Reading : History Books
Current Studying : GPEN |GCNF|CISSP??
Current Reading : CISSP| CounterHack|Gray Hat Hacking
Completed 2019 : GCIH
Free Reading : History Books
Comments
-
RobertKaucher Member Posts: 4,299 ■■■■■■■■■■If the attacker has the ability to replace a PC with an identical one to get the password, you have larger issues to worry about than someone cracking your encrypted drives. All your base are belong to them...
-
tiersten Member Posts: 4,505RobertKaucher wrote: »If the attacker has the ability to replace a PC with an identical one to get the password, you have larger issues to worry about than someone cracking your encrypted drives. All your base are belong to them...
-
msteinhilber Member Posts: 1,480 ■■■■■■■■□□If I were the bad guy I think I would go the easier route with the rubber hose attack.
-
veritas_libertas Member Posts: 5,746 ■■■■■■■■■■msteinhilber wrote: »If I were the bad guy I think I would go the easier route with the rubber hose attack.
More messy though -
tiersten Member Posts: 4,505msteinhilber wrote: »If I were the bad guy I think I would go the easier route with the rubber hose attack.
-
Hyper-Me Banned Posts: 2,059Thats a pretty retarded article.
If someone phyiscally removes your encrypted computer, they will have the rest of their life to research or find some way to decrypt it.
One form of security doesnt imply total security.....You can have bitlocker enabled on all of your servers and workstations, but if they are plugged up outside next to the trash can, there is no guarantee they wont walk off.