After a computer is powered off, the data in RAM disappears rapidly, but it can remain in RAM up to several minutes after shutdown. An attacker having access to a computer before ithe data in RAM disappears completely could recover important data from your session.
After a computer is powered off, the data in RAM disappears rapidly, but it can remain in RAM up to several minutes after shutdown. An attacker having access to a computer before the data in RAM disappears completely could recover important data from your session.
4
This can be achieved using a technique called <span class="definition">[[!wikipedia Cold_boot_attack desc="[[!wikipedia cold boot attack"]]</span>. To prevent thissuch attacks, the data in RAM is overwritten by random data when you shutting down Tails.This erases all traces from your session on that computer.
This can be achieved using a technique called [[!wikipedia cold boot attack]]. To prevent such attacks, the data in RAM is overwritten by random data when you shut down Tails.