From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.saout.de ([127.0.0.1]) by localhost (mail.saout.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sGwchRdPvZKo for ; Tue, 14 Jan 2014 02:33:13 +0100 (CET) Received: from vfemail.net (nine.vfemail.net [108.76.175.9]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.saout.de (Postfix) with ESMTPS for ; Tue, 14 Jan 2014 02:33:13 +0100 (CET) Message-ID: <52D49224.1020900@vfemail.net> Date: Mon, 13 Jan 2014 20:25:56 -0500 From: Timothy Alexander MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: [dm-crypt] Help/Question List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de Hello, I have a question. Is LUKS viable to a cold boot attack. TrueCrypt is, but I'm not sure about LUKS. If it is, is there any discussion of encrypting keys in RAM (assuming the computer is immediately turned off, hibernating, or a container is unmounted). Thank you, Timothy ------------------------------------------------- VFEmail.net - http://www.vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options!