For more info, look no further.
http://arstechnica.com/news.ars/post/20 ... -hack.html
John Timmer wrote:The paper describes algorithms for recognizing and extracting AES, DES, RSA, and tweak key information from memory. The authors have also turned these on most of the common encryption methods, including TrueCrypt and dm-crypt, as well as Mac OS-X's FileVault and Vista's BitLocker. Using an external USB drive, the authors were able to identify and extract the key and mount a BitLocker-encrypted volume in about 25 minutes. While wandering around the memory of an Intel Mac, they not only cracked the FileVault encryption but also stumbled onto multiple copies of the login password.
Thoughts? You know where to put 'em.