this post was submitted on 11 Nov 2023
404 points (97.9% liked)

Technology

59446 readers
3622 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] pelya@lemmy.world 65 points 1 year ago (2 children)

This makes it harder for russian military to steal one of Mullvad servers to track your porn usage over VPN - once they unplug it, all links to porn will be gone.

[–] nevemsenki@lemmy.world 16 points 1 year ago (1 children)

If they get hacked, your data is still there until a reboot, though. This is more useful against state authorities taking servers than hackers.

[–] bamboo@lemm.ee 21 points 1 year ago (2 children)

That’s not how ram works, at least not generally. Unless frozen to an extremely cold temperature, ram loses its value very quickly and needs constant power to retain data. If a server were to lose power at normal operating temperatures, there would be nothing significant left to recover within a few seconds.

[–] Traister101@lemmy.today 28 points 1 year ago* (last edited 1 year ago) (1 children)

I think they mean somebody gains access to the server/s thereby they could look at the ram while it's still actively running.

[–] nevemsenki@lemmy.world 1 points 1 year ago

Yeah, as long as the OS is running, it doesn't matter if its from a ramdisk or SSD/HDD.

[–] barsoap@lemm.ee 5 points 1 year ago (1 children)

It's nothing that can't be overcome with forensic equipment, though. With the right set of tools you can even take the sticks out of the server while it's still running and retain the data, that's why RAM encryption is a thing. For the really paranoid, homomorphic encryption.

[–] registrert@lemmy.sambands.net 20 points 1 year ago (1 children)

I encrypt my thoughts in case I talk in my sleep.

[–] Slinky5737@infosec.pub 24 points 1 year ago

Man's out here snoring in hash values.

[–] ElectroNeutrino@lemmy.world 8 points 1 year ago (1 children)

Harder, yes, but still good to note not impossible. There's some cryogenic techniques that allow them to preserve what's on the RAM long enough to read it.

[–] symbioticremnant@lemmy.world 4 points 1 year ago (1 children)

It's a bit of a long shot, and I'm not sure if it's just theory or proven in reality. The idea is that you literally freeze the memory at a cold enough temperature to freeze the state of the memory, and then swap the memory into a machine with power in order to read or dump the data

[–] ElectroNeutrino@lemmy.world 3 points 1 year ago* (last edited 1 year ago)

It's a variation of a cold boot attack. Instead of forcing an OS crash and rebooting into an OS connected to a portable drive, you cool the memory to extend the time you have before the data degrades and can then do whatever you want with it. I believe you can extend it up to a week.

https://citp.princeton.edu/our-work/memory/