[liberationtech] Android Full-Disk Encryption Cracked

Tom Ritter tom at ritter.vg
Mon Apr 29 19:55:33 PDT 2013


While defending against side channel attacks like power analysis is
desirable, and key stretching can be used to slow down cracking...
there's a much simpler win that can be done right now, much more
easily that using a Yubikey.

Android *NEEDS* to allow a user to have a separate unlock screen
password from the disk password. Most users are wholly unwilling to
have a long screen unlock password, but willing to have a long boot
password.  They need to be decoupled.  There is no technical reason
this is not possible (as demonstrated) - it's just usability concerns
and UI. This issue is at
https://code.google.com/p/android/issues/detail?id=29468 and I
encourage you to star it to vote for it.

-tom



More information about the liberationtech mailing list