Retrieval from memory: vulnerable or inviolable?

Retrieval from memory: vulnerable or inviolable?