Hello Duane:
As this is more of a technical discussion, lets stick to the technical
side of things, versus philosophical differences, speculations of what
someone else did on their resumes and cost versus benefits analysis.
" I the attacker has physical access to the box they could also employ
techniques to cool the RAM chips and then pull the data off them. " --
Very true! And all the more, more important to find some sort of
encryption level protection.
Thank you for the feedback.
Kind regards,
Reza.
--
*
*FOUNDER & SR. TELECOM ANALYST*
/VOIPERNETICS COMMUNICATIONS <http://www.voipernetics.com/>/*
NATION WIDE DIDS, SIP TRUNKS & VOIP 911.
PARTIAL / FULL VIRTUAL PRI - NO CONTRACTS!
HOSTED PBX & TERMINATION SERVICES.
TEL: 647-476-2067
Duane at e164 dot org wrote the following on 9/17/2011 9:10 PM:
Reza - Voipernetics wrote:
At this stage I am reaching out to the community as I have exhausted
in-house, off-shore, and paid consultants who are supposedly experts
in the field.
Yea, the supposed experts generally padded their resumes and this is a
fairly technical area.
As for apache modules, they could still be reversed into ASM and any
keys etc pulled out still.
I the attacker has physical access to the box they could also employ
techniques to cool the RAM chips and then pull the data off them.
The problems comes down to cost verse benefit, the more benefit in
stealing your secrets the more likely you are to be attacked.