lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040715200137.GF4812@kluge.net>
Date: Thu, 15 Jul 2004 16:01:37 -0400
From: Theo Van Dinter <felicity@...ge.net>
To: bugtraq@...urityfocus.com
Subject: Re: Mac OS X stores login/Keychain/FileVault passwords on disk

On Mon, Jul 12, 2004 at 11:05:45AM +0200, Adi Kriegisch wrote:
> So if you loose your powerbook someone might boot it in "target disk mode" and 
> will be able to get your password!

FWIW: You can enable the security features of OpenFirmware on modern Apple
hardware, such that things like "boot from CD", "target disk mode", etc,
are all disabled.

It adds at least another barrier for people to have to get around to
get your data.  More information is available via a Google search,
but the following URL is a pretty good reference:

http://www.mactipsandtricks.com/tips/display.lasso?mactip=118

-- 
Randomly Generated Tagline:
I'm a white male, aged 18 to 49.  Everyone listens to me!  No matter
 how dumb my suggestions are.
 
 		-- Homer Simpson
 		   Lisa vs. Malibu Stacy

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ