Germans devise attacks on Windows BitLocker
The researchers stress that the strategies are useful only for targeted attacks, such as those used in industrial espionage, where an attacker is willing to devote considerable effort to breaching a single individual's security.
They aren't of much use in opportunistic attacks, such as those when an attacker happens upon a lost laptop. Still, they said their findings are useful because they demonstrate the limits of the protection.
The link for this article located at The Register UK is no longer available.