minus-squaretrxxruraxvr@lemmy.worldtoGreentext@sh.itjust.works•The cops pay Anon a visitlinkfedilinkarrow-up0·26 days agoThey use forensic tools to clone the RAM before moving it. Probably depends on exploits so whether it will work may depend on your OS, but they have access to the hardware so there are a lot of possibilities. linkfedilink
minus-squaretrxxruraxvr@lemmy.worldtoGreentext@sh.itjust.works•The cops pay Anon a visitlinkfedilinkarrow-up0·26 days agoFull disk encryption doesn’t help much if the pc is running anyway since the key will be in memory linkfedilink
They use forensic tools to clone the RAM before moving it. Probably depends on exploits so whether it will work may depend on your OS, but they have access to the hardware so there are a lot of possibilities.