Is LUKS susceptible to memory attacks on recently powered down systems?
As far as I can tell, full disk encryption software needs to store your password and/or key in memory in plain text while the system is on. If someone is able to quickly power down your system and read your ram before it loses its data, they can potentially find your password/key.
Does LUKS/dm-crypt work this way?
If it does, could this be fixed by generating temporary keys at boot-time?
|