tag:blogger.com,1999:blog-143925273655347334.post2741927343690037806..comments2024-03-27T07:30:02.390+00:00Comments on drsolly: Is it encrypteddrsollyhttp://www.blogger.com/profile/15954188290191548178noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-143925273655347334.post-61238478152035602852015-10-25T15:49:32.841+00:002015-10-25T15:49:32.841+00:00But the same thing applies. If you're authoris...But the same thing applies. If you're authorised to have access to the sensitive info, then it'll be decrypted when you access it. So if the hacker is logged on as an authorised user, they have access to this data, even though it's encrypted a second time.drsollyhttps://www.blogger.com/profile/15954188290191548178noreply@blogger.comtag:blogger.com,1999:blog-143925273655347334.post-32151883492675654102015-10-25T13:02:18.096+00:002015-10-25T13:02:18.096+00:00...
People aren't talking about the full-disk......<br /><br />People aren't talking about the full-disk encryption that you're saying "shouldn't matter here". People are talking about their SENSITIVE INFORMATION being encrypted on top of full-disk encryption, things that can cost them money, like credit card details, debit card details, you SSN, anything that can be used to either steal money directly from you or steal your identity and from there your money. For that, those fields need to be encrypted on top of the FDE, so even if they can get a database dump from an unencrypted source, they still need to spend a lot of time figuring out how to decrypt those fields.Nate Kerkhofshttps://www.blogger.com/profile/05261397473902005432noreply@blogger.comtag:blogger.com,1999:blog-143925273655347334.post-4193004952225166212015-10-24T15:59:17.123+01:002015-10-24T15:59:17.123+01:00Perhaps your protégé, GC, is on holiday..Perhaps your protégé, GC, is on holiday..Anonymoushttps://www.blogger.com/profile/10874986622698827580noreply@blogger.com