30.2 Features

  • Address scrambling to the RAM
  • Data scrambling to/from the RAM
  • Silent access of data
  • Data remanence prevention
  • Anti-tamper Active Shield on physical TrustRAM
  • Full erasure of scramble key and RAM data on tamper detection