[Dataloss] (article) "We recovered the laptop!" ... so   what?
    sawaba 
    sawaba at forced.attrition.org
       
    Mon Feb 19 23:18:05 EST 2007
    
    
  
Indeed, the M of N feature is for key recovery only. All disk encryption 
solutions I'm familiar with are most vulnerable when they are up and 
running. At that point, you're heavily dependant on your other security 
controls.
--Sawaba
On Sat, 17 Feb 2007, Adam Shostack wrote:
> I do't believe that's effectively multi-person control of the data in
> the fashion that your nuclear launch analogy evokes.  It may be
> multi-person or multi-factor initilization, but once the system is up
> and running, there are in-memory processes which have access to all
> the data on the disk.
>
    
    
More information about the Dataloss
mailing list