alfred Doesn't memory encryption (Intel TME "Total Memory Encryption", AMD SME "Secure Memory Encryption") prevent someone from doing a cold boot attack?
Yes, it would, as the RAM encryption key would then live inside the CPU, and it is much harder to extract secrets from CPUs, since they are designed to be able to keep secrets.
The problem is that only a handful of high-end computers even support TME or equivalent today, and as far as I know, no smartphones. But in a few years it will probably be a standard feature for computers, as it is seen as an important feature to protect cooperate secrets from laptop thieves.
DeletedUser43 I'm guessing GrapheneOS provisions it's keys on install when the bootloader is unlocked.
Yes. The custom verified boot key is one of the things provisioned by the flash script you run to flash GrapheneOS on the device. If a custom key is present, the bootloader will show the yellow triangle warning with the key hash during boot like we are used to, if a custom key is not present, the bootloader will use Google's built-in key instead that only work with stock OS.
DeletedUser43 Then I think the binaries are signed by GrapheneOS, so we rely on them keeping it a secret
Yes, we rely on GrapheneOS project keeping the private keys a secret, and on them not signing any malicious releases. If the key would leak, GrapheneOS can just push out an update that will ask everyone to reinstall GrapheneOS with some new non-leaked signing keys. It is much harder to do something similar for Secure Boot on PC computers, as all motherboard vendors would have to issue BIOS updates with the leaked keys revoked and new ones added, and then get all users to manually install the BIOS update, so if a key leak, most computers will probably be left vulnerable. But GrapheneOS users are already used to flashing GrapheneOS, so the problem would not be as big.