On Mon, Feb 25, 2008 at 8:03 PM, Ken Schaefer <[EMAIL PROTECTED]> wrote: > Read their whitepaper - the RAM contents are available for between about 5 > and 25 seconds depending > on the type of RAM used.
I'm not saying attack is practical. It seems far-fetched to me. But your suggested counter-measure was, "don't keep the keys in RAM". As far as I know, if you're using a host-based crypto system, where the CPU is doing the work, the keys have to be stored in RAM. There's no way around it. No? -- Ben ~ Upgrade to Next Generation Antispam/Antivirus with Ninja! ~ ~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm> ~
