What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?
The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the user to enter). One possibility I can thi… Continue reading What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?