On Sat, 3 Aug 2019 13:24:46 -0400, Matt Hogstrom wrote:

>One use case is backups.  If someone can access a backup outside of the 
>controls the system it resides on employs they could not compromise the data.  
>Consider potential data services that host backups offsite for instance.  Your 
>protecting your data while entrusting someone with ensuring its available

>> On Aug 3, 2019, at 12:48, Cameron Conacher wrote:
>>     ...
>> So, if the underlying file is encrypted, what addition security is in place?
>> Maybe if someone breaks into the data centre and steals the disk drives?
>> 
Or, compromises a communication channel to remote storage.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to