Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Currently, complete mitigation (that is, complete protection of data in memory) requires support from the underlying operating system and JVM. For instance, if swapping sensitive data out to disk is an issue, a secure operating system that disables swapping and hibernation is required.

...