Short answer:
RAM encryption does not provide meaningful security benefits under the PlugOS threat model.
This is a deliberate design decision, not a missing feature.
When DRAM attacks become applicable
DRAM attacks such as BadRAM or Battering RAM fundamentally assume that an attacker can manipulate the memory subsystem after the system has already booted.
In PlugOS, this state is not reachable.
For any DRAM-based attack to be applicable, an attacker must first:
-
Possess the physical PlugOS device
-
Pass device authentication
-
Pass user authentication
-
Complete the PlugOS secure boot sequence
Only after these steps does DRAM contain meaningful runtime state.
Why RAM encryption does not help at that point
If an attacker has already passed device authentication, user authentication, and verified boot, they effectively own the device and the operating system.
At that stage:
-
The attacker does not need a DRAM attack
-
RAM encryption provides no additional protection
-
System state can already be observed or manipulated through legitimate execution paths
This is not unique to PlugOS.
It is a well-known limitation of memory encryption in confidential computing:
memory encryption protects against certain host-level threats, but not against attackers who control the system at boot.
Pre-boot security over post-boot hardening
PlugOS intentionally focuses on pre-boot security guarantees, including:
-
Pre-boot device authentication
-
User authentication before OS startup
-
Verified and measured boot
-
Immediate teardown when unplugged
These measures ensure that:
-
Supply-chain and memory-bus attacks are invalidated before DRAM ever holds sensitive data
-
The attack surface is eliminated early, rather than patched later
Why we do not add RAM encryption “just in case”
Enabling RAM encryption on a full Android system would:
-
Significantly degrade performance
-
Increase power consumption and latency
-
Add complexity without improving real security
Security features that do not align with the threat model often create false confidence, not real protection.
Final takeaway
PlugOS is designed to protect user data against very strong adversaries, including advanced physical attacks.
Our philosophy is simple:
Eliminate attack classes early, instead of encrypting everything after the system is already compromised.
RAM encryption does not meaningfully raise the security bar in PlugOS’s architecture — therefore, we do not rely on it.