Erase memory on shutdown
cpghost
cpghost at cordula.ws
Fri Aug 10 14:08:05 UTC 2018
On 08/05/18 17:55, Valeri Galtsev wrote:
> Another route could be encryption of RAM on-the-fly while system runs, yet
> it is questionable where the encryption key itself is kept to be
> unaccessible for the attacker in the attack above, and boot of such system
> may require warm body present.
What about SEV?
https://developer.amd.com/amd-secure-memory-encryption-sme-amd-secure-encrypted-virtualization-sev/
https://github.com/AMDESE/AMDSEV
> Valeri
-cpghost.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3992 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.freebsd.org/pipermail/freebsd-questions/attachments/20180810/bcd93f63/attachment.bin>
More information about the freebsd-questions
mailing list