[Dataloss] TJX breach shows that encryption can be foiled

Chris Walsh cwalsh at cwalsh.org
Mon Apr 2 22:41:40 UTC 2007


On Apr 2, 2007, at 2:44 PM, Casey, Troy # Atlanta wrote:

> It should make for a short list of suspects, assuming TJX was doing a
> reasonable job of key management...

That (reasonable key management) is a critical assumption.

I'd be interested in learning what algorithm (and implementation  
thereof) they were using, as well.

Not holding my breath on that info :^)

cw


More information about the Dataloss mailing list