Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

TRESOR still leaves all the code and data exposed in memory. You can modify the code that's being executed in order to divulge the contents of the debug registers.

We're working on solving the malicious device and cold boot problem at PrivateCore. To do so, we're encrypting all of main memory and keeping plaintext state in the L3 cache.

Here's a resource page with links to the TRESOR paper and other resources: http://privatecore.com/resources-overview/physical-memory-at...



Where's the source?

Or are you expecting us to trust your proprietary nonfree software without ever seeing it?

Good luck with that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: