agree, somewhat, in this case the PC/laptop needed to contact the company key encryption server @ boot up to validate, this was a little more than encrypting the drive, if the server was not contacted periodically or @ boot up, the laptop would not boot. I don't know what would happen if you removed the drive, I'm sure the drive, in this case would be worthless. when 'my position was eliminated' I had my laptop at home, it would not boot because I was not able to contact the companies network and encryption server.
Carmen Vitullo ----- Original Message ----- From: "Phil Smith III" <[email protected]> To: [email protected] Sent: Tuesday, May 7, 2019 8:21:24 AM Subject: Re: mainframe hacking "success stories"? ITschak Mugzach wrote: >Funny credit card story. Here in Israel, a company had all cc on an >encrypted hd. The person used the desktop took the hd home, booted from the >hd and copied all data. Then, from Thailand, he tried to blackmail his >employee. >What value encryption offers in this vase? Indeed. This is why whole-disk (and, in most cases, whole-file and whole-database) encryption offers very little actual protection. Application-level encryption is much more secure… …phsiii ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
