[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] German police keylogger analysis (and the effects on Tor are....?)
On 10/16/2011 3:05 PM, Julian Yon wrote:
From what I've read in past (for Windows machines) & from software docs
like True Crypt, data isn't kept in RAM indefinitely after powered off -
for a while. Exactly HOW long it takes for RAM to clear, not sure (it
wasn't hours & hours, from what I read).
On 16/10/11 17:57, William Wrightman wrote:
When you have finished then you close the partition. Now the
password is cleared from the RAM.
If you (or someone you ultimately trust) didn't write or audit the code
yourself then you are making a huge assumption there.
If you're thinking the police might break down your door, I'd either
stop doing anything remotely illegal where you are, or invest in REALLY
strong, steel doors, & look into prgms specifically designed to
overwrite / clear RAM.
If the computer was on & someone broke in, brought a power supply to
keep machine(s) powered up until get them to a research lab, then I
guess theoretically they could recover stuff from RAM as well.
tor-talk mailing list