Patrick Schleizer
|
924077e04c
|
verbose
|
2022-06-29 13:02:53 -04:00 |
|
Patrick Schleizer
|
db301dfd7f
|
comment
|
2022-06-29 13:02:39 -04:00 |
|
Patrick Schleizer
|
73d2ada0de
|
comment
|
2022-06-29 13:02:01 -04:00 |
|
Patrick Schleizer
|
295811a88f
|
improvements
|
2022-06-29 11:14:52 -04:00 |
|
Patrick Schleizer
|
024d52a67e
|
improve usr/lib/dracut/modules.d/40sdmem-security-misc/module-setup.sh
|
2022-06-29 09:52:53 -04:00 |
|
Patrick Schleizer
|
29253004b6
|
minor
|
2022-06-29 09:38:18 -04:00 |
|
Patrick Schleizer
|
6f19af1542
|
add shebang /bin/sh
to fix lintian warning
security-misc: executable-not-elf-or-script usr/lib/dracut/modules.d/40sdmem-security-misc/wipe.sh
|
2022-06-29 09:35:08 -04:00 |
|
Patrick Schleizer
|
38cdf2722b
|
- Wipe LUKS Disk Encryption Key for Root Disk from RAM during Shutdown to defeat Cold Boot Attacks
- Confirm in console output if encrypted mounts (root disk) is unmounted. (Because that is a pre-condition for wiping the LUKS full disk encryption key from RAM.)
Thanks to @friedy10!
https://github.com/friedy10/dracut/tree/master/modules.d/40sdmem
https://forums.whonix.org/t/is-ram-wipe-possible-inside-whonix-cold-boot-attack-defense/5596
|
2022-06-29 09:32:55 -04:00 |
|