By John Gruber
Lex.Games: Free daily word games from Lex Friedman. Not the weird Elon stan;
the real Lex Friedman.
Ed Felten:
Our results show that an attacker can cut power to the computer, then power it back up and boot a malicious operating system (from, say, a thumb drive) that copies the contents of memory. Having done that, the attacker can search through the captured memory contents, find any crypto keys that might be there, and use them to start decrypting hard disk contents.
★ Friday, 22 February 2008