Consider a laptop.
It normally mounts data and swap encrypted.
it requires a passphrase to login to a user which has access to
the encrypted filesystem.
When the laptop is closed, or on an inactivity timeout, it halts normal
processing, encrypts all RAM, and then invokes the "save to disk" mechanism.
Data can only be stolen if the operator cannot shut the laptop,
and the attacker does not do so, or if the operator can be coerced
to reveal the key.
What would be even nicer would be a way to checkpoint in a secure
manner all processes tainted by accessing a secure device.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/