2008/3/21, James Knott <james.knott at rogers.com>: > > Andrew Daviel wrote: > > (For the paranoid, there was recent buzz about people pulling data such > > as disk encryption keys out of RAM by cooling it, power-cycling then > > booting an alternate low-footprint OS - e.g. if someone steals your > > laptop when it's suspended or on) > > > > > I read about that a while ago. It requires that it be cooled within > seconds of power down. Even then you don't have a lot of time to recover > the data and you need the hardware to be able to extract data. The hardware? Just another laptop to insert the targeted RAM chips. Salut, Sebas. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.maemo.org/pipermail/maemo-users/attachments/20080321/0c0f1a63/attachment.htm