[Informatics] Full Disk Encryption
ken price
kenjprice at gmail.com
Sun Jul 3 19:31:09 AEST 2016
This article
https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/
suggests that for some full-disk-encryption systems, a "key escrow" system
is applies. This provides someone (eg US authorities) with a way to decrypt
it.
See also
https://www.eff.org/deeplinks/2016/03/worried-about-apple-california-has-bill-would-disable-encryption-all-phones
On Sun, Jul 3, 2016 at 4:00 PM, Mark <mark at vceit.com> wrote:
> A short beginner's guide, with relevance to terrorism and Apple vs FBI...
>
> "Full disk encryption, also known as whole disk encryption, protects data
> that’s at rest on a computer or phone, as opposed to email and instant
> messaging data that’s in transit across a network. When done effectively,
> it prevents any unauthorized person, including phone and computer makers
> themselves, from accessing data stored on a disk. "
>
> Read more
>
> https://www.wired.com/2016/07/hacker-lexicon-full-disk-encryption/
>
>
> --
>
> Mark Kelly
>
> mark at vceit.com
> http://vceit.com
>
> _______________________________________________
> http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
> VCE Informatics Mailing List kindly supported by
> http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
> Victorian Curriculum and Assessment Authority <br>
> http://www.vitta.org.au - VITTA Victorian Information Technology
> Teachers Association Inc <br>
> http://www.swinburne.edu.au/ict/schools - Swinburne University
>
--
--
Dr Ken Price MACS(Snr) CP ACCE Professional Associate.
Immediate Past President, TASITE http://www.tasite.tas.edu.au
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/informatics/attachments/20160703/74c43734/attachment.html
More information about the informatics
mailing list