lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9247.1394043282@turing-police.cc.vt.edu>
Date:	Wed, 05 Mar 2014 13:14:42 -0500
From:	Valdis.Kletnieks@...edu
To:	Jon Ringle <jringle@...dpoint.com>
Cc:	Greg KH <gregkh@...uxfoundation.org>,
	"Ringle, Jonathan" <Jonathan.Ringle@...dpoint.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] Add option to build with -O3

On Wed, 05 Mar 2014 01:19:17 -0500, Jon Ringle said:

>  If you are not the intended recipient, please contact the sender by reply
> email and destroy all copies of the original message.

Is your company willing to indemnify my organization for the costs of tracking
down *all* copies of the message (including, but not restricted to, those on
backup tapes, copies automatically committed to WORM-based compliance stores by
our mail system, and already logically deleted but not yet overwritten blocks
on disk), and securely clearing the data sufficient to prevent its recovery by
an experienced forensics analyst armed with a subpoena and a "preserve
evidence" order?

And does your company's clientele realize that in case of a miscue on
the part of one of your staff, you're relying on an unknown third party's
good will to secure their confidential information, instead of relying on
actual cryptography to secure their data?

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ