On Wed, May 13, 2009 at 3:38 PM, Hetz Ben Hamo <het...@gmail.com> wrote:
> Well, the authentication is secured. Without keys, no access...

In that case you had better be good at keeping backup copies of the
keys and depending upon whose data it is making sure they know exactly
where to get them if they need to.

I occasionally see postings from people who have encrypted data
belonging to long dead family members that they have no way of
retrieving.

You also don't want to be disturbed on vacation when a file gets
corrupted and no one has the key to the backup, or if they do have it,
knows that they do.

Geoff.
-- 
Geoffrey S. Mendelson N3OWJ/4X1GM
Jerusalem, Israel

_______________________________________________
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il

Reply via email to