I'd be interested in any proven capture in-transit (NOT in storage at
the insecure end!).

V/R

Jim Meritt, CISSP, CISA

[EMAIL PROTECTED] wrote:
> 
> I was interested if anyone knew of any "specific" case examples where low level
> encryption (ie 40bit or lower) has been insufficient to accommodate in the safe
> passage of financial data to and from clients.....
> 
> Are there any bonafied/well known corporate examples where someone externally
> has 'captured' low level encrypted data in transit, and reassembled it to its
> original form?
> 
> Any URL's, pointers or discussion appreciated...
> 
> Cheers.
> 
> *******************Internet Email Confidentiality Footer*******************
> 
> Privileged/Confidential Information may be contained in this message.  If you
> are not the addressee indicated in this message (or responsible for delivery of
> the message to such person), you may not copy or deliver this message to anyone.
> In such case, you should destroy this message and kindly notify the sender by
> reply email. Please advise immediately if you or your employer does not consent
> to Internet email for messages of this kind.  Opinions, conclusions and other
> information in this message that do not relate to the official business of my
> firm shall be understood as neither given nor endorsed by it.

-- 
James W. Meritt CISSP, CISA
Booz | Allen | Hamilton
phone: (410) 684-6566

Reply via email to