• General
  • What prevents attackers from reading out RAM memory

Computers are very vulnerable to so called "cold-boot attacks", which is where the attacker unplugs the RAM memory modules from the running computer and into their own device, that keeps the RAM memory modules powered, but reads out cached disk content and disk encryption keys loaded in the kernel. The problem here is that the RAM memory modules are easily removable, and won't lose their content for several seconds after losing power, thus can be moved that way, but also that they aren't encrypted in any sense.

My understanding is that on Pixel phones, the RAM memory modules are soldered on, and thus cannot be easily removed. But my understanding is also that they are still entirely unencrypted. What prevent well-invested attackers from opening up the running phone, adding some wires to "virtually" replug the RAM memory module from the phone to their own device, and then read out all cached file content and loaded disk encryption keys? Why do we not hear about attacks like this, but instead that they are exploiting vulnerabilities, which should supposedly be much harder to do?

    I know that some encryption software such as veracrypt for example, give you the option to encrypt the keys in memory, so they always remain encrypted. Not sure how they get it done. I am not certain on how GoS works.

    ryrona What prevent well-invested attackers from opening up the running phone, adding some wires to "virtually" replug the RAM memory module from the phone to their own device, and then read out all cached file content and loaded disk encryption keys?

    I think the storage encryption keys are "wrapped" keys that are held by the storage controller, i.e., not in regular DRAM. The GrapheneOS platform requirements include "Inline disk encryption acceleration with wrapped key support".

    Blastoidea No one is going to bite on this?

    The GrapheneOS community includes people around the world, in different time zones, with different sleep schedules and work obligations.

    Given that, I don't think a five-hour timeout is generally appropriate. While it is often nice to get a rapid response, it's not an entitlement.

      de0u I like your helpful posts but this was uncalled for. We know the earth is round and while some people sleep, others work, but a little consideration would be welcome. I am certain the above member who I happen to have a soft spot for was just curious why no one reacts to what some may consider an important topic for a prolonged period of time. A little more tact or just passing on passing judgement goes a long way. I know, I am not the one who should be saying that, since I am from time to time outright rude but this is a feature of mine I live with every day. Good day to all.