Content deleted Content added
Reverted 1 edit by 174.250.180.84 (talk): Unexplained content removal |
Citation bot (talk | contribs) Alter: title. | You can use this bot yourself. Report bugs here. | Suggested by AManWithNoPlan | All pages linked from cached copy of User:AManWithNoPlan/sandbox3 | via #UCB_webform_linked 978/1471 |
||
Line 61:
When a computer with a self-encrypting drive is put into [[sleep mode]], the drive is powered down, but the encryption password is retained in memory so that the drive can be quickly resumed without requesting the password. An attacker can take advantage of this to gain easier physical access to the drive, for instance, by inserting extension cables.<ref name="sed-attacks" />
The firmware of the drive may be compromised<ref>{{cite web | url = https://www.wired.com/2015/02/nsa-firmware-hacking/ | title = How the
=== Criticism ===
|