Start A Petition

Encrypted Data - Who Cares? Group Develops Simple Method for Cracking and Stealing It

Science & Tech  (tags: data theft, online theft, encrypted data, Princeton, hacking )

- 3740 days ago -
A group of geeks led by a Princeton University researcher finds it easy to hack encryted data by chilling a computer memory chip with a blast of frigid air from a can of dust remover. It can't be done remotely, but still...

Select names from your address book   |   Help

We hate spam. We do not sell or share the email addresses you provide.


RC deWinter (418)
Friday February 22, 2008, 8:20 am
Remember yesterday's stories of onlinhe medical records? Well, here's a good reason not to jump on THAT bandwagon. This study was partially funded by the US Department of Homeland Security, who declined to comment on the report after release. This discovery has very "chilling" implications across a huge swath of the online world.\

Further information available at the research site:

FAQS on These Findings

Cold Boot Attacks on Encryption Keys

Tim Redfern (581)
Friday February 22, 2008, 9:30 am
The two stories go hand-in-hand for sure,
What I'm wondering is, how bored were these
kids at Princeton, to spray dust-remover on
the chip to see what happened?

Past Member (0)
Friday February 22, 2008, 9:37 am
Tim you said it...these kids at Princeton must be bored...not getting enough to study I scary is this...paying all that money to go to this prestigious college to learn how to hack into computers...good going guys..noted ..thanks Cate

Past Member (0)
Friday February 22, 2008, 9:37 am
noted...thanks for posting Cate...

Jim P (3257)
Friday February 22, 2008, 9:51 am
Looks like another case and example of how vulnerable computers are even with encryption codes in them that can be hacked by some 13-year old in the basement of his parents home. As long as he doesn't breathe in the dust remover compressed air up his nose, he'll be fine. Medical records and other "secret" files should not be stored on line anywhere.

TY, Cate.

Past Member (0)
Friday February 22, 2008, 9:59 am

Elle J (276)
Friday February 22, 2008, 10:03 am
Are these the same people that figured out that the Diebold voting machines could be hacked into without leaving a trace? They found in that study that you could actually take a vote from one person and give it to another.Make anybody nervous? I know it gives me pause for thought!

RC deWinter (418)
Friday February 22, 2008, 10:07 am
These are not kids at Princeton, this was an official research project headed by someone at Princeton and partially funded by Homeland Security to find out if encrypted data could be hacked.

Elle, the Diebold group brought in a Finnish tech whiz who not only was able to reset the counters so one candidate actually started out with invisible votes, AND was able to change votes as well asa give two votes to one for a particular candidate.

In other words, every time someone voted A, B would get 2 votes. It IS SCARY!

RC deWinter (418)
Friday February 22, 2008, 10:07 am
If you click the links in my first post you will see who did the study...hardly kids...

Carolyn T (234)
Friday February 22, 2008, 10:47 am
Noted. Sounds like this could be done fairly easily within any system where things are think? And I should feel safe about having even more of my personal information stored on line at a "safe" site. Suuurrrrre. Thanks, Cate

Terrie Williams (798)
Friday February 22, 2008, 10:50 am

O O O (143)
Friday February 22, 2008, 11:18 am
Ty Cate!!! NOW that it is PUBLISHED so it is no longer under Title18USC-OOOOOOO they will just love you for this-it is all TRUE!! Is there m o r e,well,...sorry,but!

Joycey B (750)
Friday February 22, 2008, 12:29 pm
Noted. Thanks Cate.

Blacktiger P (247)
Friday February 22, 2008, 12:42 pm
TY Cate, Hey everybody, who invented computors in the first place??? GEEKS, with nothing better to do like Law,Medicine, etc. Look at the dotcom era and see the GEEKS who got rich, or lost their shirts in the crash. Now the GEEKS have developed the "bluetooth" a system that talks within itself, between your cell phone and laptop and printer etc. In the next few months if we want to see a movie at home, we must go to WALMART and buy a whole new "bluetooth compatible" setup!!! ME NOT HAPPY ABOUT THAT!!!!!!!

Past Member (0)
Friday February 22, 2008, 2:21 pm
Not to be a know-it-all..yeah right... just kidding;) but I heard that in Russia 10 years ago, 10 years ago right now actually. Some of my friends knew it. They are absolute experts and I hate to say it but miles above Princeton..not to single them out. Kind of like the pairs figure skating of the time..noone else was close at all.

O O O (143)
Friday February 22, 2008, 2:32 pm
Art:GO LOOK at Cates e-address for this ,it is IMPORTANT,& it appears you have not or you would not have wrote this! Cate,wher this comes from is quasy in the public domain as to the co. but i still,especaily w/Buchco. am not going to print it here! If one of you does,i w/ neither confirm nor denie!

Karen M (176)
Friday February 22, 2008, 2:44 pm
I just encrypted all my data, too. Oh well!

Sandra M Z (114)
Friday February 22, 2008, 10:47 pm
There is no privacy anywhere, anymore. They can see into your home through your computer webcam, and they will also be able to access you through the new T.V. technology they are mandating next year. Not much I care about on T.V. anyway, maybe it will be time to unplug the T.V. and ducttape up the webcam lens. I've been hearing clicks on my phone, they may be checking up on me after reading my comments on Care2 to see what a threat I may be :)lol to the Homeland. Big Brother is in the house! Noted, thanks Cate.

O O O (143)
Saturday February 23, 2008, 1:59 pm
There can indeed be both security & privacy,but it can no longer be taken for granted& will require both vigelancy & work to aquire& perhaps-when more people are successful at it,doing it may then becoem illegal like anything else the servants do not want the government to konw,have or use. Like hand or car mounted anti radars.

Denice G (45)
Saturday February 23, 2008, 8:13 pm
Noted Thanks Cate

O O O (143)
Sunday February 24, 2008, 4:36 pm
And Art,your right re R. but US had it too& Long ago. Unles you are a systems creator& keep it from them,it will always be this way,but if you do do this,then try to market,or perhaps openly use it PURELY of yourself-watch out!
Or, log in with your
Facebook account:
Please add your comment: (plain text only please. Allowable HTML: <a>)

Track Comments: Notify me with a personal message when other people comment on this story

Loading Noted By...Please Wait


butterfly credits on the news network

  • credits for vetting a newly submitted story
  • credits for vetting any other story
  • credits for leaving a comment
learn more

Most Active Today in Science & Tech

Content and comments expressed here are the opinions of Care2 users and not necessarily that of or its affiliates.

New to Care2? Start Here.