There are devices that allow moving and confiscating computers without powering them off.
The rest are true.
Comment on We have successfully completed our migration to RAM-only VPN infrastructure - Mullvad VPN
lustrum@sh.itjust.works 1 year agoWhat does “without any disks in use” mean?
There are devices that allow moving and confiscating computers without powering them off.
The rest are true.
That’s assuming those computers weren’t already powered off first.
Sure, but how often does that happen to servers running 24/7? They’d have to set up some sort of dead man’s switch, movement sensors, or something. It’s unlikely they’d get a day’s notice that the servers are going to be confiscated for forensic analysis.
How long do you think it takes to broadcast a network wide shutdown command over the management network?
KairuByte@lemmy.dbzer0.com 1 year ago
While mostly true, there are ways to preserve ram if the device is confiscated.
Your local PD likely couldn’t pull it off, but if one of the larger abbreviation agencies were to get involved, data on RAM isn’t a huge hurdle. Assuming no one flips the power switch, at least.
reluctantpornaccount@reddthat.com 1 year ago
Yeah, freezing and dumping RAM is a well known attack, even happening at some airports with laptops. But it still requires very recently powered ram, basically still in operation before extraction. It’s a big step toward security at least.
lustrum@sh.itjust.works 1 year ago
I guess it’s going to stop any standard agencies with a warranty. Confiscating the machine for it to sit in a warehouse until some forensic techs get their hands on it.