1 of 1 people found this helpful
The standard attack would not work any more - it would have to be re-crafted to attack the memory space of the EEPC Login.
The real benefit would be of course that you'd not be able to boot the machine to a Windows login prompt, thus your hibernated/off machine would be perfectly secure.
Any Offical McAfee documentation that I can give to a customer's CSO that would put his mind at ease?
nothing comes to mind sorry - we really don't often officialy respond to attacks which don't work ;-)
I blogged about it a long while ago - http://blogs.mcafee.com/enterprise/data-protection/bitlockertruecrypt-decryption -tool which links to a personal article I wrote about Firewire specifically...