Quote from: Guru on May 25, 2012, 08:04 pmQuote from: kmfkewm on May 25, 2012, 12:09 amIt isn't that low risk, specialized police do cold boot attacks all the time.http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10641927 My understanding is that this was the province of specialized units -- perhaps this technique has become more general in its application. Quote from: kmfkewm on May 25, 2012, 12:09 amhm there was a news article not that long ago where police were talking about internet drug scene using encryption, and how they are starting to train agents to get memory while it is still live, but I can't find it right now. They talked about several of their tactics for getting to encryption keys in memory though. www.ncjrs.gov/pdffiles1/nij/219941.pdfthere is a LE guide for first responders on how to deal with memory in ways that maximize the chance of obtaining encryption keysI have long maintained that, if you can be identified/located, to the point that they are knocking on your door, then you have already failed. Anonymity is your primary defence; once that fails, everything else is a fallback position. GuruWell said Guru - disk encryption is only one layer of defence. My own opinion for what it's worth though is if it is to be the last layer, let's make it a secure one!V.