Security data on the device is still obtained from RAM
An important file that has the password can still be revealed because the attacker only needs to cut off the power of the machine, turn it back on and then boot with a USB drive or iPod that can copy the file contents still saved Random access memory RAM.
An important file that has the password can still be revealed because the attacker only needs to cut off the power of the machine, turn it back on and then boot with a USB drive or iPod that can copy the file contents still saved Random access memory RAM.
A group of researchers at Princeton University (USA) said that even if this data is stored in an encrypted hard drive, it could be lost. The problem called this "cold-boot attack" is being discussed by Usenix Security Conference.
Images depicting RAM data disappear after 30 seconds, 60 seconds and 5 minutes,
when RAM is in normal state. Photo: CNet .
But just spraying liquid nitrogen into RAM can prolong data loss time.
Normally, data on RAM will fade over time from seconds to minutes after the power is cut. But this time is enough for the owner to read them, including the key and the content, after rebooting the computer into another operating system or removing the memory chip and then placing it on another computer.
It is worth noting that the attacker can extend the time of data loss on RAM by cooling the memory chip by spraying compressed air into it (gas in a spray bottle or used to clean the computer keyboard) in when the machine is running. Liquid nitrogen will cause the chip to hold data for a few days so that hackers are comfortable with it.
" The forms of encryption in use are not steel shields for user data ," said team leader J. Alex Halderman. " Therefore, organizations and individuals who are too confident in disk encryption need to pay more attention ."
- 4 data security applications on iPhone that you should have
- Secure Android smartphone in a professional way
- 4 web browsers pay great attention to security
- Building a private data security strategy: Challenges with financial businesses
- If you don't want to be a victim of Ransomware, read this article
- What is data exfiltration? How to prevent this dangerous behavior?
- How to secure data when working from home
- Fake data - new product 'booming'
- How valuable is the user's personal data?
- Overview of security deployment for iPhone and iPad