- doc
- advanced topics
- Soğuk önyükleme saldırılarına karşı koruma
Bir bilgisayar kullanırken, işlenen tüm veriler geçici olarak [[!Wikipedia Random-access_memory desc="RAM"]] içine yazılır: metinler, kaydedilmiş dosyalar, aynı zamanda şifreler ve şifreleme anahtarları. Etkinlik ne kadar yeni olursa, verilerin hala RAM'de olma olasılığı o kadar yüksektir.
After a computer is powered off, the data in RAM disappears rapidly, but it can remain in RAM up to several minutes after shutdown. An attacker having access to a computer before the data in RAM disappears completely could recover important data from your session.
This can be achieved using a technique called cold boot attack. To prevent such attacks, the data in RAM is overwritten by random data when you shut down Tails.
Dahası, bilgisayara fiziksel erişimi olan bir saldırgan Tails çalışırken bile RAM'deki verileri ele geçirebilir. Bundan kaçınmak ve hızlı bir şekilde Tails'i kapatmak için farklı yöntemleri öğrenin.
As far as we know, cold boot attacks are not a common procedure for data recovery.
In a research report from 2011, Defense Research and Development Canada concluded that cold boot attacks can be useful in some cases to acquire data in memory but are not a panacea and have many drawbacks dictated by the laws of physics, which cannot be overcome by the technique. The authors recommend to only use cold boot attacks as a last resort when all other avenues have been exhausted.
See how we implement this memory erasure, for example, if you want to implement this feature outside of Tails.