[Dataloss] TJX breach shows that encryption can be foiled
Chris Walsh
cwalsh at cwalsh.org
Mon Apr 2 22:41:40 UTC 2007
On Apr 2, 2007, at 2:44 PM, Casey, Troy # Atlanta wrote:
> It should make for a short list of suspects, assuming TJX was doing a
> reasonable job of key management...
That (reasonable key management) is a critical assumption.
I'd be interested in learning what algorithm (and implementation
thereof) they were using, as well.
Not holding my breath on that info :^)
cw
More information about the Dataloss
mailing list