• Maybe, it depends how it works.

    Memory is often unencrypted and/or contains encryption keys. Many programs rely on the assumption that it’s cleared on powerdown for security.

    Depending on how this memory enters the long term state it seems that a lot of legacy software might become vulnerable to a really simple attack.

    Pulling the plug might no longer be something that forces someone to engage in rubber hose analysis.

      • Sure of course of course but umm have you seen software?

        There are still windows xp computers on the internet.

        It’s not insurmountable, and of course I have no idea if/how this will roll out.

        Just it seems to mess with a rather deep assumption we have about how computers operate when we develop software and threat models.