After a computer is powered off, the data in RAM disappears rapidly, but it can remain in RAM up to several minutes after shutdown. An attacker having access to a computer before ithe data in RAM disappears completely could recover important data from your session.
After a computer is powered off, the data in RAM disappears rapidly, but it can remain in RAM up to several minutes after shutdown. An attacker having access to a computer before the data in RAM disappears completely could recover important data from your session.
4
This can be achieved using a technique called <span class="definition">[[!wikipedia Cold_boot_attack desc="[[!wikipediacold boot attack"]]</span>. To prevent thissuch attacks, the data in RAM is overwritten by random data when youshutting down Tails.This erases all traces from your session on that computer.
This can be achieved using a technique called [[!wikipedia cold boot attack]]. To prevent such attacks, the data in RAM is overwritten by random data when you shut down Tails.