Erase memory on shutdown

cpghost cpghost at cordula.ws
Fri Aug 10 14:08:05 UTC 2018


On 08/05/18 17:55, Valeri Galtsev wrote:
> Another route could be encryption of RAM on-the-fly while system runs, yet
> it is questionable where the encryption key itself is kept to be
> unaccessible for the attacker in the attack above, and boot of such system
> may require warm body present.

What about SEV?

https://developer.amd.com/amd-secure-memory-encryption-sme-amd-secure-encrypted-virtualization-sev/
https://github.com/AMDESE/AMDSEV

> Valeri

-cpghost.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3992 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.freebsd.org/pipermail/freebsd-questions/attachments/20180810/bcd93f63/attachment.bin>


More information about the freebsd-questions mailing list