90
you must not use TrueCrypt on a computer that an attacker has physically accessed. Furthermore,
you must ensure that TrueCrypt (including its device driver) is not running when the attacker
physically accesses the computer. Additional information pertaining to hardware attacks where the
attacker has direct physical access is contained in the section
Unencrypted Data in RAM
.
Furthermore, even if the attacker cannot physically access the computer hardware
directly
, he or
she may be able to breach the physical security of the computer by remotely intercepting and
analyzing emanations from the computer hardware (including the monitor and cables). For
example, intercepted emanations from the cable connecting the keyboard with the computer can
reveal passwords you type. It is beyond the scope of this document to list all of the kinds of such
attacks (sometimes called TEMPEST attacks) and all known ways to prevent them (such as
shielding or radio jamming). You must prevent such attacks. It is solely your responsibility to do so.
If you do not, TrueCrypt may become unable to secure data on the computer.
Dostları ilə paylaş: