You need a key to be able to decrypt the data you are reading off the disk.

All that encryption mechanisms do (and this is true of encryption anywhere) is 
move the attack from the data to the encryption key. Your problem becomes 
secure key storage, secure key exchange and ensuring that you choose an 
encryption algorithm that itself doesn't have flaws.

Cheers
Ken

-----Original Message-----
From: Mike Gill [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 26 February 2008 10:26 AM
To: NT System Admin Issues
Subject: RE: FYI: Security boffins unveil BitUnlocker

I wonder if once the key unlocked the encrypted partition, then it can be
moved to disk. Then the area of memory in which the key was contained (or
all the memory) zeroed out. Oh well, I don't know what I'm talking about and
I'm sure very smart people are working on the problem. ;)

--
Mike Gill


> -----Original Message-----
> From: Ben Scott [mailto:[EMAIL PROTECTED]
> Sent: Monday, February 25, 2008 3:06 PM
> To: NT System Admin Issues
> Subject: Re: FYI: Security boffins unveil BitUnlocker
>
>   I'm trying to figure out how I'm supposed to get the computer to use
> a key if it cannot put the key in RAM...  :-)

~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

Reply via email to