Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] ssd's in linux




On Fri, 8 Nov 2013, Bill Bogstad wrote:

> On Fri, Nov 8, 2013 at 4:34 PM, Richard Pieri <richard.pieri at gmail.com> wrote:
>> Kent Borg wrote:
>>>
>>> I don't think that passes DoD requirements either.
>> ....
>> Or you could use RAM-based SSDs instead of flash. Almost instant sanitizing
>> when power is removed.
>
> Where "almost instant" means up to ten minutes if the RAM has been pre-chilled.

Yes, but how exactly will the intruder get to pre-chill your RAM before 
you turn off the machine? And why would he bother? If he has physical 
access to your machine while it is still turned on, why would he wait for 
you to turn it off? Am I missing a common threat?

Daniel Feenberg




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org