The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Lenovo ThinkPad TPM Encryption Hacked

    Discussion in 'Lenovo' started by dlhuss, Feb 23, 2008.

  1. dlhuss

    dlhuss Notebook Consultant

    Reputations:
    9
    Messages:
    182
    Likes Received:
    0
    Trophy Points:
    30
    I thought some of you might want a heads up. I haven't activated my chip yet - but for those who have...

    From today's New York Times...

    "A group led by a Princeton University computer security researcher has developed a simple method to steal encrypted information stored on computer hard disks.

    The technique, which could undermine security software protecting critical data on computers, is as easy as chilling a computer memory chip with a blast of frigid air from a can of dust remover. Encryption software is widely used by companies and government agencies, notably in portable computers that are especially susceptible to theft."

    They show a ThinkPad in the article's picture and in the video below.

    http://www.nytimes.com/2008/02/22/technology/22chip.html

    <object width='425' height='355'><param name="movie" value="http://www.youtube.com/v/JDaicPIgn9U&rel=1"></param><param name="wmode" value="transparent"></param><embed src="http://www.youtube.com/v/JDaicPIgn9U&rel=1" type="application/x-shockwave-flash" wmode="transparent" width='425' height='355'></embed></object>


    Princeton Link: http://citp.princeton.edu/memory/
     
    Last edited by a moderator: May 6, 2015
  2. maditude

    maditude Notebook Evangelist

    Reputations:
    132
    Messages:
    341
    Likes Received:
    0
    Trophy Points:
    30
    Wow, I never would have thought you could literally freeze the data in DRAM chips. Neat hack.
     
  3. Fade To Black

    Fade To Black The Bad Ass

    Reputations:
    722
    Messages:
    3,841
    Likes Received:
    1
    Trophy Points:
    106
    It's not just Lenovo. Why does it have to be Lenovo related? All business laptops have TPM (including Sony, Dell, HP and others), so this is a general problem.
    What kind of encryption does it use?
    From what I can see it's more of a physical problem, rather than software (though that can be fixed through software).
     
  4. LoneWolf15

    LoneWolf15 The Chairman

    Reputations:
    976
    Messages:
    1,537
    Likes Received:
    1
    Trophy Points:
    55
    Since you have to have physical access to the computer to perform this hack, it's still of limited usefulness.

    Encryption utilities could likely be adjusted to at least partially compensate for this hack by clearing any cached passwords when a machine goes into sleep/hibernate/screensaver mode; this would require that the user re-authenticate when waking the machine, but would mean that a notebook would have to be accessed in a relatively short window of time (assuming you configure sleep/hibernation/screensaver mode aggressively) for the hack to work. Also, such utilities would probably need to encrypt any swapfile/virtual memory on the machine (I know OS X already has this option).
     
  5. EateryOfPiza

    EateryOfPiza Notebook Geek

    Reputations:
    24
    Messages:
    95
    Likes Received:
    0
    Trophy Points:
    15
    The one way to solve this would be for hardware manufacturers to stick an extra capacitor on either their mobos or their RAM sticks to clear the RAM after a shutdown.

    But even then, it might be vulnerable to unanticipated shutdowns.
     
  6. acruxksa

    acruxksa Notebook Consultant

    Reputations:
    36
    Messages:
    226
    Likes Received:
    0
    Trophy Points:
    30
    This hack also applies to many software encryption methods. The one thing that stand out to me in the video and link is that people who put their laptops in hibernation and or sleep mode would seem to be much more at risk. If you turn your laptop off and ensure its secure for a couple minutes your risk goes way down. If however you put your laptop to sleep and a thief steals it they can take as much time as necessary to get all the proper equipment in place to freeze your ram and recover the encryption key.

    If you don't use sleep or hibernate mode, this is not an easy exploit since it requires actual physical access to the device within a very limited time frame.

    At this point it's more of a theoretical vulnerability than an actual one.
     
  7. dlhuss

    dlhuss Notebook Consultant

    Reputations:
    9
    Messages:
    182
    Likes Received:
    0
    Trophy Points:
    30
    I owned a Vista Laptop for 2 weeks. Microsoft recommended not to shutdown but rather hit the "power button." Is this sleep or hibernate mode? Then by default many laptops will be left in this mode and susceptible to this hack.
     
  8. acruxksa

    acruxksa Notebook Consultant

    Reputations:
    36
    Messages:
    226
    Likes Received:
    0
    Trophy Points:
    30

    Pushing the power button (not holding it down for 4 or 5 seconds) puts my laptop in sleep mode (I run Vista 64). I think this is configurable though, but by default i believe you are correct.

    The reality is that most people are not going to be carrying the kind of information on their laptops that would make them targets of this attack so don't panic. If however you carry a laptop or use a desktop with extremely sensitive data stored on it, perhaps you should get in the habit of completely shutting down your computer and just hanging out with it for a minute or two.

    I still believe the biggest security risk people have is using weak passwords, no passwords or writing their password on a post-it note that's stuck to their monitor.