lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <cef7ee56040716045518ad0ae@mail.gmail.com>
Date: Fri, 16 Jul 2004 07:55:02 -0400
From: Ray Slakinski <ray.slakinski@...il.com>
To: bugtraq@...urityfocus.com
Subject: Re: Mac OS X stores login/Keychain/FileVault passwords on disk


This all depends on the amount of ram you have and what is nornally
done on  your mac.  Still a major issue you have, but if you put in 
>640 you probably have nothing to worry about.  A sad work around I
know, but while we wait for the ever slow to fix things - namely Apple
- its the best you can do.

[-----]
Ray Slakinski
 
GnuPG Fingerprint: 
9065 5C54 2C4A B13B 52BB  C37A 125B F012 08A7 0A54
 
Blog: http://ddll.sdf1.net

On Mon, 12 Jul 2004 11:05:45 +0200, Adi Kriegisch <adi@...tuwien.ac.at> wrote:
> The swapfiles are deleted on startup -- this means even a clean shutdown by
> user leaves the passwords on disk.
> So if you loose your powerbook someone might boot it in "target disk mode" and
> will be able to get your password!
> 
> Adi


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ