113
you are viewing a single comment's thread
view the rest of the comments
[-] insurgenRat@beehaw.org 11 points 1 year ago

This sounds like a giant security risk?

[-] FaceDeer@kbin.social 15 points 1 year ago

Sounds more like a very small security risk, to me. For most people if someone steals their laptop it doesn't really matter what kind of RAM is in it.

If you're in some kind of high-security role then use a laptop with volatile RAM instead. Non-volatile will probably be more expensive than the old stuff for quite a while so it's not going anywhere.

[-] insurgenRat@beehaw.org 10 points 1 year ago

Maybe, it depends how it works.

Memory is often unencrypted and/or contains encryption keys. Many programs rely on the assumption that it's cleared on powerdown for security.

Depending on how this memory enters the long term state it seems that a lot of legacy software might become vulnerable to a really simple attack.

Pulling the plug might no longer be something that forces someone to engage in rubber hose analysis.

[-] FaceDeer@kbin.social 4 points 1 year ago

Many programs rely on the assumption that it’s cleared on powerdown for security.

In a world with ULTRARAM those programs will need to be rewritten to operate under new assumptions.

[-] insurgenRat@beehaw.org 7 points 1 year ago

Sure of course of course but umm have you seen software?

There are still windows xp computers on the internet.

It's not insurmountable, and of course I have no idea if/how this will roll out.

Just it seems to mess with a rather deep assumption we have about how computers operate when we develop software and threat models.

[-] bedrooms@kbin.social 5 points 1 year ago

The better example is that there are still programs compiled in Win 95 running here and there if I'm correct.

[-] FaceDeer@kbin.social 1 points 1 year ago

Sure, but anyone who's still running WindowsXP on their laptop wants to suffer.

As always, the security-minded will be able to secure their devices and everyone else will not care until it bites them. ULTRARAM isn't revolutionary in that regard.

[-] mp3@lemmy.ca 3 points 1 year ago

Depends if the RAM is encrypted, and how secure the TPM is.

[-] insurgenRat@beehaw.org 6 points 1 year ago* (last edited 1 year ago)

I admit to being out of the game for a while but how common is RAM encryption?

wouldn't the overhead violate half the point of RAM?

[-] d3Xt3r@lemmy.nz 3 points 1 year ago* (last edited 1 year ago)

There's always a tradeoff in computing between security v/s performance/overhead, so the value of it depends on your threat model, and the attack vectors you're expecting.

Anyways, RAM encryption is generally "available" in various forms, depending on the mobo, CPU, software used etc, but it's not commonly enabled/used. Most AMD boards (at least, mid-range and above should) have an option in the BIOS to enable Secure Memory Encryption (SME). This allows the OS to selectively encrypt memory pages, making use of a hardware AES engine that sits outside of the CPU.

There's also Transparent SME (TSME), which encrypts the entire memory and works completely independent of the OS and software. Usually only high-end/workstation boards have this, and it also requires a Ryzen PRO CPU. TSME also has a much lower overhead, I recall reading somewhere it's something like only 5%.

I believe Intel also has something similar, but I never looked into it.

AMD have a whitepaper available with an overview on how this stuff works, if you're interested: https://www.amd.com/system/files/TechDocs/memory-encryption-white-paper.pdf

this post was submitted on 18 Aug 2023
113 points (100.0% liked)

Technology

37728 readers
533 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS