[OT] Security for stacks with Community version

2013-05-05 Thread Timothy Miller
Years ago, when I first wrote my "rolodex" stack, I intended to store phone numbers, addresses, passwords, credit card numbers, bank account numbers, and other useful information in one convenient place, one stack in a suite of stacks I use in my day to day business. If these fell into the wrong

Re: [OT] Security for stacks with Community version

2013-05-06 Thread Paul Hibbert
Tim, I came across a topic on stack exchange that you may be interested in… http://security.stackexchange.com/questions/18720/how-secure-is-filevault-2-while-the-computer-is-in-sleep-mode There is a link to Apple's white paper on FileVault 2, this may help answer some of your concerns, but you

Re: [OT] Security for stacks with Community version

2013-05-06 Thread Andrew Kluthe
Was it not mentioned long ago that a password protected stack's script and custom properties could be accessed in memory while it is running in a stand alone? So your data was probably never as secure as you really thought it was. As for the documentation on those encrypt/decrypt commands, they se

Re: [OT] Security for stacks with Community version

2013-05-06 Thread Richard Gaskin
Andrew Kluthe wrote: Was it not mentioned long ago that a password protected stack's script and custom properties could be accessed in memory while it is running in a stand alone? So your data was probably never as secure as you really thought it was. I believe RunRev engineers are exploring op

Re: [OT] Security for stacks with Community version

2013-05-06 Thread Timothy Miller
On May 6, 2013, at 7:56 AM, Richard Gaskin wrote: > Andrew Kluthe wrote: >> Was it not mentioned long ago that a password protected stack's script and >> custom properties could be accessed in memory while it is running in a >> stand alone? So your data was probably never as secure as you really

Re: [OT] Security for stacks with Community version

2013-05-06 Thread J. Landman Gay
On 5/6/13 12:38 PM, Timothy Miller wrote: I don't get your example. As far as I can tell, it's worthless if anyone can look at the relevant script to discover the encrypting keys. But let's save that for another thread. Well, as long as we're in this thread...blowfish is an algorithm, one of