BreachExchange mailing list archives

Re: (article) "We recovered the laptop!" ... so what?


From: sawaba <sawaba () forced attrition org>
Date: Mon, 19 Feb 2007 23:18:05 -0500 (EST)


Indeed, the M of N feature is for key recovery only. All disk encryption 
solutions I'm familiar with are most vulnerable when they are up and 
running. At that point, you're heavily dependant on your other security 
controls.

--Sawaba

On Sat, 17 Feb 2007, Adam Shostack wrote:

I do't believe that's effectively multi-person control of the data in
the fashion that your nuclear launch analogy evokes.  It may be
multi-person or multi-factor initilization, but once the system is up
and running, there are in-memory processes which have access to all
the data on the disk.

_______________________________________________
Dataloss Mailing List (dataloss () attrition org)
http://attrition.org/dataloss
Tracking more than 149 million compromised records in 580 incidents over 7 years.


Current thread: