Le mercredi 04 décembre 2019 à 16:59 -0700, John M. Harris Jr a écrit :
> On Wednesday, December 4, 2019 12:38:20 PM MST Przemek Klosowski via
> devel 
> wrote:
> > - stolen/lost laptop:  I think this is the most important one for
> > most  
> > people; it is mitigaged by a trusted-network-based decryption,
> > unless 
> > the device is in unencrypted sleep mode and the new 'beneficial
> > owner' 
> > manages to read the disk before the system goes down.
> 
> That may be the case for home users, but not for businesses. Let's
> take this 
> example. Employee A has files from a given project, but Employee B
> doesn't 
> have access to that project. Employee B is malicious, and takes
> Employee A's 
> laptop, gets it on the network, it unencrypts itself and then takes
> it. The 
> data is not Employee B's.

Let’s get real, in most businesses, the data will already be available
in a network share, a common database, etc. Trying to perform fine-
grained control checks on the mass of data businesses routinely
manipulate is a loosing game. You always end up needing to trust
humans.

That’s even the case in ultra-secure environments like the NSA. How do
you think wikileaks happened?

-- 
Nicolas Mailhot
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Reply via email to