Scientists at Princeton have get wind a way to take hold of otherwise - protected information encoding keys from memory on a computer that ’s just been powered down . This is pretty scary stuff , since the Francis Scott Key — which are well protected when the computer is on — are the one thing that keeps super - tight encoding from cracking .
It was antecedently thought that data point support in so - scream “ volatile memory ” was only keep on for a few seconds after the automobile was switched off . But the squad found that data point include encoding Florida key could be held and regain for up to several minute .
The best access , it seems , come when the burglar powers down a hibernating laptop . If he throws it in a freezer first , he ’ll get even better solvent : “ A laptop computer cool down to about -50ºC will keep information in its memory for 10 second or more . ”

There ’s a simple defense lawyers . If you shut down your laptop and let it sit for several minutes before going into a dangerous environ , there is little chance that the winder would be recovered from explosive memory . But seriously , when was the last meter anyone shut down their laptop completely ? [ BBC News ]
DataEncryptionLaptopsSecurity
Daily Newsletter
Get the best tech , science , and refinement newsworthiness in your inbox daily .
newsworthiness from the future , fork out to your present .
You May Also Like












![]()

