I'd be interested in any proven capture in-transit (NOT in storage at the insecure end!).
V/R Jim Meritt, CISSP, CISA [EMAIL PROTECTED] wrote: > > I was interested if anyone knew of any "specific" case examples where low level > encryption (ie 40bit or lower) has been insufficient to accommodate in the safe > passage of financial data to and from clients..... > > Are there any bonafied/well known corporate examples where someone externally > has 'captured' low level encrypted data in transit, and reassembled it to its > original form? > > Any URL's, pointers or discussion appreciated... > > Cheers. > > *******************Internet Email Confidentiality Footer******************* > > Privileged/Confidential Information may be contained in this message. If you > are not the addressee indicated in this message (or responsible for delivery of > the message to such person), you may not copy or deliver this message to anyone. > In such case, you should destroy this message and kindly notify the sender by > reply email. Please advise immediately if you or your employer does not consent > to Internet email for messages of this kind. Opinions, conclusions and other > information in this message that do not relate to the official business of my > firm shall be understood as neither given nor endorsed by it. -- James W. Meritt CISSP, CISA Booz | Allen | Hamilton phone: (410) 684-6566
