Rule 5: OSs are weaker than cryptosystems
Most operating systems are pretty weak
- Look for deleted files and slack space
- Look in cache areas and paging areas
- Look for the plaintext files
- Look for the password in files
- Plant a bug in the OS and exploit in real time
- Collect keystroke information via the OS
- Put a Trojan in the encryption/decryption program
- ... You can think of many more I’m sure