agree, somewhat, in this case the PC/laptop needed to contact the company key 
encryption server @ boot up to validate, this was a little more than encrypting 
the drive, if the server was not contacted periodically or @ boot up, the 
laptop would not boot. I don't know what would happen if you removed the drive, 
I'm sure the drive, in this case would be worthless. 
when 'my position was eliminated' I had my laptop at home, it would not boot 
because I was not able to contact the companies network and encryption server. 




Carmen Vitullo 

----- Original Message -----

From: "Phil Smith III" <[email protected]> 
To: [email protected] 
Sent: Tuesday, May 7, 2019 8:21:24 AM 
Subject: Re: mainframe hacking "success stories"? 

ITschak Mugzach wrote: 

>Funny credit card story. Here in Israel, a company had all cc on an 

>encrypted hd. The person used the desktop took the hd home, booted from the 

>hd and copied all data. Then, from Thailand, he tried to blackmail his 

>employee. 



>What value encryption offers in this vase? 



Indeed. This is why whole-disk (and, in most cases, whole-file and 
whole-database) encryption offers very little actual protection. 
Application-level encryption is much more secure… 



…phsiii 


---------------------------------------------------------------------- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to [email protected] with the message: INFO IBM-MAIN 


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to