For Mac users, setting an Open Firmware/EFI password[1] will prevent this exploit from working. On newer models, OF/EFI passwords can no longer be reset by swapping out RAM modules[2], though Apple and authorized service providers apparently have a tool to reset them[3].<p>Of course, if the machine had to be rebooted or turned off as part of the OF/EFI password reset, the sought-after encryption keys would be lost anyway (barring a cold boot attack[4]).<p>[1] <a href="http://www.macinstruct.com/node/507" rel="nofollow">http://www.macinstruct.com/node/507</a><p>[2] <a href="http://tinyapps.org/blog/mac/200605110700_open_firmware_password_hack.html" rel="nofollow">http://tinyapps.org/blog/mac/200605110700_open_firmware_pass...</a><p>[3] <a href="http://support.apple.com/kb/TS3554?viewlocale=en_US&locale=en_US" rel="nofollow">http://support.apple.com/kb/TS3554?viewlocale=en_US&locale=e...</a><p>[4] <a href="http://en.wikipedia.org/wiki/Cold_boot_attack" rel="nofollow">http://en.wikipedia.org/wiki/Cold_boot_attack</a><p>EDIT: The Inception page links to a method for disabling firewire DMA without a firmware password: <a href="http://ilostmynotes.blogspot.com/2012/01/os-x-open-firmware-settings-use-nvram.html" rel="nofollow">http://ilostmynotes.blogspot.com/2012/01/os-x-open-firmware-...</a>