Prosecution based on memory forensics

David Tomaschik david at
Thu Jan 13 16:40:42 CET 2011

On Thu, Jan 13, 2011 at 9:00 AM, Werner Koch <wk at> wrote:

> On Thu, 13 Jan 2011 12:23, johanw at said:
> > For Windows, TrueCrypt has a free open source solution to this in the
> > form of system encryption.
> Does not help.  Despite that we talked about hibernation, most users
> don't use S4 (Suspend-to-Disk) but the system goes into S3
> (Suspend-to-RAM) when you close the lid.  Better systems then proceed to
> S4 only when the battery gets too low.
> Reading out a powered RAM (S3) might be complicated for the home user
> but not for a lab.
> Shalom-Salam,
>   Werner
> As usual, it all depends on your threat model. If you're really paranoid,
don't use gpg-agent.  :)

David Tomaschik, RHCE, LPIC-1
GNU/Linux System Architect
GPG: 0x5DEA789B
david at
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20110113/a2f08525/attachment.htm>

More information about the Gnupg-users mailing list