View Single Post
Old 16.01.2015, 11:44
dandi dandi is offline
Senior Member
Join Date: Jan 2014
Location: Lausanne
Posts: 358
Groaned at 19 Times in 14 Posts
Thanked 353 Times in 204 Posts
dandi is considered knowledgeabledandi is considered knowledgeabledandi is considered knowledgeable
Re: Synology recommendation

View Post
Because attacks against many encryption systems are feasible if you have physical access to a running system?
You have a point here... in the realms of all possibilities... but is physically breaking into a safe really more difficult than getting access to a running system's memory to steal an encryption key or volatile decrypted data? Provided one has blocked the usual IO ports? That seems more tricky to me than using a circular saw... Or maybe I'm missing something?
Reply With Quote