[Dataloss] (article) "We recovered the laptop!" ... so what?
sawaba
sawaba at forced.attrition.org
Mon Feb 19 23:18:05 EST 2007
Indeed, the M of N feature is for key recovery only. All disk encryption
solutions I'm familiar with are most vulnerable when they are up and
running. At that point, you're heavily dependant on your other security
controls.
--Sawaba
On Sat, 17 Feb 2007, Adam Shostack wrote:
> I do't believe that's effectively multi-person control of the data in
> the fashion that your nuclear launch analogy evokes. It may be
> multi-person or multi-factor initilization, but once the system is up
> and running, there are in-memory processes which have access to all
> the data on the disk.
>
More information about the Dataloss
mailing list