Re: [Fed-Talk] Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
Re: [Fed-Talk] Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
- Subject: Re: [Fed-Talk] Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
- From: "Miller, Timothy J." <email@hidden>
- Date: Mon, 27 Aug 2012 15:32:30 +0000
- Thread-topic: [Fed-Talk] Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
On 8/27/12 10:25 AM, "Pike, Michael (IHS/HQ)" <email@hidden> wrote:
>That's good to hear :)
>
>I will admit I didn't read it in depth because it came in on my phone
>while at a red light and i read it in about 10 seconds and replied
>immediately....
>
>I think it's rather stupid to even brag about this if you require the
>password! If you have the password/decryption key why do you need any
>forensic tool?
Because the forensic investigator may not have the originating system
(which must be preserved for evidence) and is only working with bit-copies.
-- T
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden