In addition to the methods discussed in the previous chapters, there are also more advanced, specialized methods available. The JTAG and chip-off methods are both highly useful tools in many common situations, but require advanced training (and a lot of practice before working on live evidence!). The final advanced method, a cold boot attack to recover encryption keys, is far more theoretical.