I just read over the 10-k again, and I think they've included enough information to figure out what happened, using some educated guesses. I'm going to start working on "reverse engineering" the statements.
<br><br>--Sawaba<br><br><div><span class="gmail_quote">On 4/2/07, <b class="gmail_sendername">Chris Walsh</b> <<a href="mailto:cwalsh@cwalsh.org">cwalsh@cwalsh.org</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<br>On Apr 2, 2007, at 2:44 PM, Casey, Troy # Atlanta wrote:<br><br>> It should make for a short list of suspects, assuming TJX was doing a<br>> reasonable job of key management...<br><br>That (reasonable key management) is a critical assumption.
<br><br>I'd be interested in learning what algorithm (and implementation<br>thereof) they were using, as well.<br><br>Not holding my breath on that info :^)<br><br>cw<br>_______________________________________________
<br>Dataloss Mailing List (<a href="mailto:dataloss@attrition.org">dataloss@attrition.org</a>)<br><a href="http://attrition.org/dataloss">http://attrition.org/dataloss</a><br>Tracking more than 203 million compromised records in 609 incidents over 7 years.
<br></blockquote></div><br>