Subject | Re: [IB-Architect] Fw: Mischievous SYSDBA |
---|---|
Author | Jim Starkey |
Post date | 2000-05-25T15:52:59Z |
At 05:48 PM 5/25/00 +0200, Steve Tendon wrote:
b) the bad guy has access to the InterBase source and c) the bad
guy has the ability to spoof the application to acquire an encryption
key, then no, I don't think a solution is possible.
Jim Starkey
>If you assume that a) a bad guy has access to the database file and
>The issue is that highjacked databases are open for inspection, even with
>very primitive tools (NotePad...). Can we raise the bar somehow?
>
>This is a problem. What is the solution? Is there a solution? Do we want to
>find a solution? or is it too hard?
>
b) the bad guy has access to the InterBase source and c) the bad
guy has the ability to spoof the application to acquire an encryption
key, then no, I don't think a solution is possible.
Jim Starkey