Africa-focused technology, digital and innovation ecosystem insight and commentary.
…
continue reading
Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
The current state of full disk encryption is still not good (2025) (gpn23)
MP4•Episode home
Manage episode 489964036 series 2475293
Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
In theory, full disk encryption (FDE) just works. You just have to enable it. But in practice, cops get access to a lot of devices, even when they are encrypted. I want to summarize the current state of full disk encryption. I will explain conceptional weaknesses/attacks, practical physical attacks (videos of live demos) and give recommendations. I will explain how TPMs work and how you can use them to increase (but also break) the security of your device. The focus is on Linux and TPMs. I will briefly talk about the broken state of Smartphone Security and Window's FDE Bitlocker. There is also Linux hands-on. ##### AGENDA - Motivation & Threat Model - Smartphone Security - History of cold boot attacks - Full disk encryption on Linux - TPM 2.0 (How does it work? How can I use it? Attacks, benefits and problems) - Windows FDE (is currently broken) - How I do FDE on Linux Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://cfp.gulas.ch/gpn23/talk/FJMWAE/
…
continue reading
1848 episodes
MP4•Episode home
Manage episode 489964036 series 2475293
Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
In theory, full disk encryption (FDE) just works. You just have to enable it. But in practice, cops get access to a lot of devices, even when they are encrypted. I want to summarize the current state of full disk encryption. I will explain conceptional weaknesses/attacks, practical physical attacks (videos of live demos) and give recommendations. I will explain how TPMs work and how you can use them to increase (but also break) the security of your device. The focus is on Linux and TPMs. I will briefly talk about the broken state of Smartphone Security and Window's FDE Bitlocker. There is also Linux hands-on. ##### AGENDA - Motivation & Threat Model - Smartphone Security - History of cold boot attacks - Full disk encryption on Linux - TPM 2.0 (How does it work? How can I use it? Attacks, benefits and problems) - Windows FDE (is currently broken) - How I do FDE on Linux Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://cfp.gulas.ch/gpn23/talk/FJMWAE/
…
continue reading
1848 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.