<div><span class="gmail_quote">2008/3/21, James Knott <<a href="mailto:james.knott@rogers.com">james.knott@rogers.com</a>>:</span>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Andrew Daviel wrote:<br>> (For the paranoid, there was recent buzz about people pulling data such<br>> as disk encryption keys out of RAM by cooling it, power-cycling then<br>
> booting an alternate low-footprint OS - e.g. if someone steals your<br>> laptop when it's suspended or on)<br>><br>><br>I read about that a while ago. It requires that it be cooled within<br>seconds of power down. Even then you don't have a lot of time to recover<br>
the data and you need the hardware to be able to extract data.</blockquote>
<div> </div>
<div>The hardware? Just another laptop to insert the targeted RAM chips.</div>
<div> </div>
<div>Salut,</div>
<div>Sebas.</div></div><br>