On Sat, 3 Aug 2019 13:24:46 -0400, Matt Hogstrom wrote: >One use case is backups. If someone can access a backup outside of the >controls the system it resides on employs they could not compromise the data. >Consider potential data services that host backups offsite for instance. Your >protecting your data while entrusting someone with ensuring its available
>> On Aug 3, 2019, at 12:48, Cameron Conacher wrote: >> ... >> So, if the underlying file is encrypted, what addition security is in place? >> Maybe if someone breaks into the data centre and steals the disk drives? >> Or, compromises a communication channel to remote storage. -- gil ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN