You've got a point there.
Anyway, any encryption where the key is stored on disk or anywhere else
in a form where it can be read by people is not encryption at all, it's
just marketing.
If you are actually concerned with having encryption that keeps people
out rather than keeps regulators happy then hardware encryption
solutions with adequate key management are the only real option.
> -----Original Message-----
> From: EMC NetWorker discussion
> [mailto:NETWORKER AT LISTSERV.TEMPLE DOT EDU] On Behalf Of Rick Brode
> Sent: Wednesday, 19 December 2007 11:17 AM
> To: NETWORKER AT LISTSERV.TEMPLE DOT EDU
> Subject: [Networker] encryption of bootstrap
>
> A student in class today raised a question about AES
> encryption that I
> can't answer. When a directive is configured to perform aes
> encryption
> during backup of a NW client, is the bootstrap save set also
> encrypted?
>
NOTICE
This e-mail and any attachments are confidential and may contain copyright
material of Macquarie Group Limited or third parties. If you are not the
intended recipient of this email you should not read, print, re-transmit, store
or act in reliance on this e-mail or any attachments, and should destroy all
copies of them. Macquarie Group Limited does not guarantee the integrity of any
emails or any attached files. The views or opinions expressed are the author's
own and may not reflect the views or opinions of Macquarie Group Limited.
To sign off this list, send email to listserv AT listserv.temple DOT edu and
type "signoff networker" in the body of the email. Please write to
networker-request AT listserv.temple DOT edu if you have any problems with this
list. You can access the archives at
http://listserv.temple.edu/archives/networker.html or
via RSS at http://listserv.temple.edu/cgi-bin/wa?RSS&L=NETWORKER
|