I'm trying to interpret this video demonstration by F-Secure of the big cold-boot attack discovered last year.
- What is happening at the 50-second mark?
- Why does he insert the USB boot-device before doing whatever he does next? Was this necessary?
Thanks.