insurgenRat, 10 months ago Maybe, it depends how it works. Memory is often unencrypted and/or contains encryption keys. Many programs rely on the assumption that it’s cleared on powerdown for security. Depending on how this memory enters the long term state it seems that a lot of legacy software might become vulnerable to a really simple attack. Pulling the plug might no longer be something that forces someone to engage in rubber hose analysis.
Maybe, it depends how it works.
Memory is often unencrypted and/or contains encryption keys. Many programs rely on the assumption that it’s cleared on powerdown for security.
Depending on how this memory enters the long term state it seems that a lot of legacy software might become vulnerable to a really simple attack.
Pulling the plug might no longer be something that forces someone to engage in rubber hose analysis.