Cold Boot attacks and the trust-the-hardware boundary
The Princeton Cold Boot paper demonstrates substantial attacks against full-disk encryption. The structural implications for the trust-the-hardware threat model are real.
The Princeton Cold Boot paper demonstrates substantial attacks against full-disk encryption. The structural implications for the trust-the-hardware threat model are real.