R
RadioPatrol
Guest
For the Techies or curious out there ..... it is possible to recover information from a PC's Memory by cutting the power and rebooting off of a thumb drive with minimal system and copy the ram contents for later analysis .... Laptop memory can hold info as long as 10 min, but most desktop PC's maybe a minuet at the most .... longer if the memory is chilled with "liquid" sprayed from caned air
..... <snip>
The implication of the paper has to do specifically with disk encryption. These are systems that try to encrypt the contents of file on hard drives of PCs so that if the computer is lost or stolen, the person who gets the computer won't be able to read all the files.
We found a method that is able to defeat all of the disk encryption systems that we've tried it on, which I think is now up to six systems roughly. And the basic reason is that all of these systems need to keep the secret encryption key somewhere, and the only place they can put it is in the RAM.
What we found, basically, is a way to get access to RAM, even if it's screen-locked.
The way we get access to RAM is by exploiting a pretty surprising property of RAM. RAM is supposed to be volatile -- when you turn off the power, it forgets the information. What we found is that information in RAM sticks around a lot longer. It sort of fades out over much longer than anybody thought.
..... <snip>
Any three-letter federal agencies? There are some rumors that some of these agencies may have known about of these methods before. We looked really hard for any written evidence of that -- any news stories, any documents from the agencies, anything in the published literature -- and couldn't find it. But nonetheless there are rumors. I wouldn't be surprised if some agencies had known about it.