Feb. 25, 2008: Cold boot data theft

Share this article:
Princeton professor Ed Felten explains how his research team discovered a surprisingly simple method of reading encrypted data from a DRAM chip that had been removed from a PC after its power was shut off and chilled.
Share this article:
close

Next Article in Podcasts

Sign up to our newsletters