On Tue, Feb 14, 2006 at 04:26:35PM -0500, Steven M. Bellovin wrote:
In message [EMAIL PROTECTED], Werner Koch writes:
I agree. However the case at hand is a bit different. I can't
imagine how any application or upper layer will be able to recover
from that error (ENOENT when opening
Steven M. Bellovin [EMAIL PROTECTED] writes:
According to the BBC, the British government is talking to Microsoft about
putting in a back door for the file encryption mechanisms.
That's one way of looking at it. It's not really a backdoor, it's a way of
spiking DRM. If the UK government can be
Ok the lurker posts...Can someone explain to me why security specialists think this:The system uses BitLocker Drive Encryption through a chip called TPM (Trusted Platform Module) in the computer's motherboard.
is going to stop authorities from retreiving data?I ask this question on the basis of
Chris Olesch wrote:
Ok the lurker posts...
Can someone explain to me why security specialists think this:
The system uses BitLocker Drive Encryption through a chip called TPM
(Trusted Platform Module) in the computer's motherboard.
is going to stop authorities from retreiving data?
I