Red Team Lab Security Audit?

You mean maybe audit the RAM wipe feature only? That would be interesting. It’s a complex enough task to warrant it and would be a huge contribution that otherwise is unlikely to happen anytime soon. Also a more straight forward task for “hello”.

We’d need to add an extra chapter giving hints how to audit such a feature? Nothing new. Replicating the same method(s) the original cold boot attack authors described and performed in their paper.

  1. Should wait until this feature hits stable? It’s not much tested yet. Not even by me.

  2. Should wait for the future design to get implemented?

1 Like