Hacker News new | past | comments | ask | show | jobs | submit login

Memory encryption makes cold-boot attacks unfeasible. I doubt someone could decap a processor fast enough in order to mount a cold-boot attack on the keying material stored inside of it. I see this as a natural step in the evolution of Trusted Computing, so Intel's interest in such technology doesn't surprise me.



It also makes it hard to do things like Thunderstrike or whatever the "read secrets in RAM via DMA from attached devices" issue is called.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: