Hacker News new | past | comments | ask | show | jobs | submit login

People said the same thing about cold boot attavks against encryption keys. Yet today the police and others are using that and other NAND attacks regularly.

HIPPA is a very easy compliance standard to meet. If it seems difficult to meet those requirements with your standard tool configurations, you should think about what that means with respect to the integrity of your data.




I would like to see a case of a cold boot attack by the police.


Memory forensics is a thing.

Google around with terms like forensics and "Volatility" or "Volatility toolkit" and you should find some presentations and other references.


I know what memory forensics is and I use Volatility and Second Look and quite a few other things pretty often, I've asked specifically about an instance of cold boot attack that you claimed in a hyperbole that are used often or at all by the police.

You know what I don't need a case, please find me a jurisdiction in which cold boot attacks have passed forensic certification, e.g. a link to the process like for example from a body equivalent to the ASTM https://www.astm.org/Standards/forensic-science-standards.ht... would suffice.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: