Difference between revisions of "Talk:GID Key"

From The iPhone Wiki
Jump to: navigation, search
(Vaumnou: new section)
Line 6: Line 6:
   
 
I really doubt the AES key is ever in memory. This is an attack against drive encryption, not hardware coprocessors. Fault analysis or timing would be our best bet.
 
I really doubt the AES key is ever in memory. This is an attack against drive encryption, not hardware coprocessors. Fault analysis or timing would be our best bet.
  +
  +
== Vaumnou ==
  +
  +
Unless you can cause read faults by browning out the chip or the ROM is external, you can't use fault analysis. And if the ROM is external, it would probably be easier to unsolder it and read it directly.

Revision as of 21:49, 4 August 2008

drg

Would this be vulnerable to a cold boot attack?

geohot

I really doubt the AES key is ever in memory. This is an attack against drive encryption, not hardware coprocessors. Fault analysis or timing would be our best bet.

Vaumnou

Unless you can cause read faults by browning out the chip or the ROM is external, you can't use fault analysis. And if the ROM is external, it would probably be easier to unsolder it and read it directly.