First you get the happy news, Truecrypt will now offer system drive encryption, and you go to bed with a big grin on your face..
Sorry for being the carrier of bad news, but you might as well wipe that grin of your face and start rethinking your security plans.. Sure, we are not talking revelation of a super master key for all encryption, but still the guys at Princeton University did a good enough job of making smiles fade..
The idea is; RAM is not erased the second the computer is turned off, it will take anywhere from seconds to minutes before RAM is reset to “0”, and as the encryption key is found in ram (For most software, including Bitlocker and Truecrypt) what these people do is to boot a usb device and dump the entire ram content before it fades… They even slow down the process via an air cooling spray adding almost unlimited time to do their ‘evil’ deed.
Revealing the keys and compromising data will in most cases (not all it would seem) require a rapid response from the potential hacker, the technique require physical access to the computer within minutes after it is turned off (not true for hibernation or sleep mode mind you). However Bitlocker even in some configurations seemed ‘hackable’ even if turned completely off (cold).
Sounds like science fiction, well the you tube video they produced seem somewhat convincing.
Steps you can do to to counteract this;
DONT use hibernation or SLEEP mode.
If possible use the “enter a password” at bootup.
In bios disallow booting from USB.
These steps will not make you 100% secure, but will make things way more difficult.
For more details;
http://citp.princeton.edu/memory/