Blackberry Suffering Blight
Yet another security threat to the platform beloved of Enterprise users
Cooking, like security, is both art and craft; you must understand both what to do and what not to do in order to create something that is fit for purpose. Consider a turnip: boil one, mince it in a food-processor and the resulting tasty goo will be irrevocably different from the original root; plus you’ll unlikely need to mince it more than once – overmincing your puree will yield soup.
However when mincing digital data you’re probably pursuing one of two goals: one goal is encryption where someone will eventually feed the puree backwards through the mincer to reconstitute the original turnip. This is possible because algorithmic mincing may be infinitely and precisely repeatable and in these cases as Mr Haynes tells us reassembly can be the reverse of disassembly.
…at the Unscrewing Security blog
Leave a Reply