Bruno Wolff III wrote:
I don't think swap and vulnerabilities that allow you to read
memory
(and the disk keys) if you steal the machine with power on (including
suspend to memory) are relevant.
You're probably right about that, but they should be relevant. If a machine
containing my information is lost/stolen I do not care whether the company
thinks their encryption on it was *probably* good enough, I should be notified
the information is out of their control.
--
Andrew Farris <lordmorgul(a)gmail.com>
www.lordmorgul.net
gpg 0xC99B1DF3 fingerprint CDEC 6FAD BA27 40DF 707E A2E0 F0F6 E622 C99B 1DF3
No one now has, and no one will ever again get, the big picture. - Daniel Geer
---- ----