Hello Duane:

As this is more of a technical discussion, lets stick to the technical side of things, versus philosophical differences, speculations of what someone else did on their resumes and cost versus benefits analysis.

" I the attacker has physical access to the box they could also employ techniques to cool the RAM chips and then pull the data off them. " -- Very true! And all the more, more important to find some sort of encryption level protection.

Thank you for the feedback.

Kind regards,
Reza.


--
*
*FOUNDER & SR. TELECOM ANALYST*
/VOIPERNETICS COMMUNICATIONS <http://www.voipernetics.com/>/*
NATION WIDE DIDS, SIP TRUNKS & VOIP 911.
PARTIAL / FULL VIRTUAL PRI - NO CONTRACTS!
HOSTED PBX & TERMINATION SERVICES.
TEL:  647-476-2067

Duane at e164 dot org wrote the following on 9/17/2011 9:10 PM:
Reza - Voipernetics wrote:
At this stage I am reaching out to the community as I have exhausted in-house, off-shore, and paid consultants who are supposedly experts in the field.

Yea, the supposed experts generally padded their resumes and this is a fairly technical area.

As for apache modules, they could still be reversed into ASM and any keys etc pulled out still.

I the attacker has physical access to the box they could also employ techniques to cool the RAM chips and then pull the data off them.

The problems comes down to cost verse benefit, the more benefit in stealing your secrets the more likely you are to be attacked.

Reply via email to