Bootkit Bypasses TrueCrypt Encryption 192
mattOzan writes with this excerpt from H-online: "At Black Hat USA 2009, Austrian IT security specialist Peter Kleissner presented a bootkit called Stoned which is capable of bypassing the TrueCrypt partition and system encryption. The bootkit uses a 'double forward' to redirect I/O interrupt 13h, which allows it to insert itself between the Windows calls and TrueCrypt."
Re:Is this really surprising? (Score:3, Funny)
...
* look inside your computer once in a while
For WHAT?!?!? Gnomes transcribing your keystrokes?
Oblig (Score:5, Funny)
Re:LFP is doomed (Score:5, Funny)
This sure is a big hit on the Linux for Pedophiles distro.
What part of "insert itself between the Windows calls and TrueCrypt" did you miss?
Maybe that's what he calls Windows?