Does pureboot have mitigations against cold boot attack to steal full disk encryption key?

This goes against other goals such as a longer lifetime for the product by being able to upgrade / replace the RAM.

What is your assumed attack?

  1. The computer is powered on, booted and then stolen?
  2. The computer is in standby and then stolen?
  3. The computer is hibernated and then stolen?
  4. The computer is shutdown and then stolen?

I would think that the mitigation for the third and fourth is to clear the key from RAM at the appropriate point in time during shutdown.

1 Like