alt.fan.prettyboyPrev. Next
Re: Interesting reading regarding TrueCrypt Anonymous, Inc.
The Lookout (the_lookout@nym.mixmin.net) 2010/04/06 16:38

From: The Lookout <the_lookout@nym.mixmin.net>
Subject: Re: Interesting reading regarding TrueCrypt
References: <0001HW.C7E0067D002E5E82B02919BF@news.newscene.com>
Organization: Anonymous, Inc.
X-No-Archive: yes
Message-ID: <20100406223811.0CE3C81409@fleegle.mixmin.net>
Date: Tue, 6 Apr 2010 23:38:11 +0100 (BST)
Newsgroups: alt.fan.prettyboy
Path: news.nzbot.com!spool1.sonic-news.com!news-out.sonic-news.com!iad.highwinds-media.com!feeder.news-service.com!news.alt.net!fictitious-path
X-Abuse-Contact: abuse@mixmin.net
Lines: 36
Xref: news.nzbot.com alt.fan.prettyboy:9124

Morpheus <Morpheus@dreamland.com> wrote:
>I think with an iMac you can just pull the power cord and with a
>notebook,
>the on/off switch itself is a kill switch if held down for about 4 or 5
>seconds.  Shouldn't that be sufficient in an emergency?
>
>I'm curious also if true crypt passwords are cached on MacOS.   If they
>were
>in what cache would they reside?   Some cache locations are easier to
>empty
>than others.  Some shut-down routines can automatically empty some
>chache
>storage on power down, but not all have that feature and I'm not sure
>it's
>all cache locations or only those from a selected list.
>
>Any thoughts?

Hi Morph,

It appears that the Mac OS does (or did at one time) cache passwords
in memory similarly to PC's.

http://arstechnica.com/apple/news/2008/02/mac-os-x-login-password-can-be-phy
sically-recovered-from-ram.ars

http://news.softpedia.com/news/Mac-Users-Beware-of-Password-Exposing-Glitch-
79817.shtml

The system cache or virtual memory could also be a place to worry about
as anything resident in memory could potentially wind up in the swapfile.

Take care,
The Lookout


Follow-ups:12345678910111213141516
Next Prev. Article List         Favorite