| 
| Re: Interesting reading regarding TrueCrypt | Anonymous, Inc. |  | The Lookout (the_lookout@nym.mixmin.net) | 2010/04/06 16:38 |  | 
 | From: The Lookout <the_lookout@nym.mixmin.net> Subject: Re: Interesting reading regarding TrueCrypt
 References: <0001HW.C7E0067D002E5E82B02919BF@news.newscene.com>
 Organization: Anonymous, Inc.
 X-No-Archive: yes
 Message-ID: <20100406223811.0CE3C81409@fleegle.mixmin.net>
 Date: Tue,  6 Apr 2010 23:38:11 +0100 (BST)
 Newsgroups: alt.fan.prettyboy
 Path: news.nzbot.com!spool1.sonic-news.com!news-out.sonic-news.com!iad.highwinds-media.com!feeder.news-service.com!news.alt.net!fictitious-path
 X-Abuse-Contact: abuse@mixmin.net
 Lines: 36
 Xref: news.nzbot.com alt.fan.prettyboy:9124
 
 Morpheus <Morpheus@dreamland.com> wrote:
 >I think with an iMac you can just pull the power cord and with a
 >notebook,
 >the on/off switch itself is a kill switch if held down for about 4 or 5
 >seconds.  Shouldn't that be sufficient in an emergency?
 >
 >I'm curious also if true crypt passwords are cached on MacOS.   If they
 >were
 >in what cache would they reside?   Some cache locations are easier to
 >empty
 >than others.  Some shut-down routines can automatically empty some
 >chache
 >storage on power down, but not all have that feature and I'm not sure
 >it's
 >all cache locations or only those from a selected list.
 >
 >Any thoughts?
 
 Hi Morph,
 
 It appears that the Mac OS does (or did at one time) cache passwords
 in memory similarly to PC's.
 
 http://arstechnica.com/apple/news/2008/02/mac-os-x-login-password-can-be-phy
 sically-recovered-from-ram.ars
 
 http://news.softpedia.com/news/Mac-Users-Beware-of-Password-Exposing-Glitch-
 79817.shtml
 
 The system cache or virtual memory could also be a place to worry about
 as anything resident in memory could potentially wind up in the swapfile.
 
 Take care,
 The Lookout
 
 
 | 
 
 
| Follow-ups: | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 
 |  |