Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>However, this measure can still be circumvented by removing the memory module from the system and reading it back on another system under the attacker's control that does not support these measures

https://en.wikipedia.org/wiki/Cold_boot_attack



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: