[Dataloss] (article) "We recovered the laptop!" ... so what?

sawaba sawaba at forced.attrition.org
Mon Feb 19 23:18:05 EST 2007


Indeed, the M of N feature is for key recovery only. All disk encryption 
solutions I'm familiar with are most vulnerable when they are up and 
running. At that point, you're heavily dependant on your other security 
controls.

--Sawaba

On Sat, 17 Feb 2007, Adam Shostack wrote:

> I do't believe that's effectively multi-person control of the data in
> the fashion that your nuclear launch analogy evokes.  It may be
> multi-person or multi-factor initilization, but once the system is up
> and running, there are in-memory processes which have access to all
> the data on the disk.
>


More information about the Dataloss mailing list