No, that's not even close to true.  If the only fields encypted were the 
procedure and trigger source blobs, nothing would be inaccessible without the 
key except those blobs.

Obviously you disagree.  Please explain your logic.


> On Sep 1, 2014, at 9:51 AM, Dimitry Sibiryakov <s...@ibphoenix.com> wrote:
> 
> 01.09.2014 15:22, James Starkey wrote:
>> But, unless additional work is done, the simple answer is that if you 
>> encrypt the BLR
>> version it won't work at all without the key.
> 
>   As the result, the efforts to protect database content from stealing leads 
> to a 
> database that cannot be used. Security catch #1: information is either 
> accessible or 
> secured, but there is no way to get both.
> 
> -- 
>   WBR, SD.
> 
> ------------------------------------------------------------------------------
> Slashdot TV.  
> Video for Nerds.  Stuff that matters.
> http://tv.slashdot.org/
> Firebird-Devel mailing list, web interface at 
> https://lists.sourceforge.net/lists/listinfo/firebird-devel

------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to