On Mon, Feb 25, 2008 at 6:22 PM, Ken Schaefer <[EMAIL PROTECTED]> wrote: > The key isn't in RAM available to be stolen if the machine is off.
The article in question asserts that in some cases, it actually can be. To quote, "... researchers show that data is vulnerable because encryption keys and passwords stored in a computer's temporary memory -- or RAM -- do not disappear immediately after losing power." It remains to be seen exactly how practical this attack is. But if proves out that DRAM, widely thought to be volatile storage (contents lost on power-off), is actually non-volatile in practical situations, this will be a Very Big Deal. -- Ben ~ Upgrade to Next Generation Antispam/Antivirus with Ninja! ~ ~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm> ~
