On 05.10.2025 10:30 Uhr [email protected] wrote: > On Sun, Oct 05, 2025 at 08:01:41AM +0200, Marco Moock wrote:
> > Of course, it is possible to use security vulnerabilities in the > > running OS. > > > > Getting the RAM content is also possible if the RAM is being frozen > > and then removed from the motherboard. > > > > I haven't heard of that in real situations. > > https://en.wikipedia.org/wiki/Cold_boot_attack > > Now you have :-) I know this article, but I haven't heard of such an attack in a real situations outside of the laboratory. Dunno if some police officers already used that. -- kind regards Marco Send spam to [email protected]

