Link
Two comments:
1) Notice that she did not say the data on the tapes was "encrypted" merely "compressed".
2) Yep, she played the "advanced" card.
2.a) First rule of damage control: when you cough up data, you must insist the attacker necessarily used "very sophisticated" or "advanced" techniques even if it involved simply changing the URL to list a different account number.
2.b) Second rule of damage control: when you lose a data tape, you must insist that the data would require a "very sophisticated" or "advanced" computer hardware to actually retrieve the data regardless of how the data was stored.
In addition, she said, the missing back-up tape contained compressed data that would require very advanced computer systems to access.
Two comments:
1) Notice that she did not say the data on the tapes was "encrypted" merely "compressed".
2) Yep, she played the "advanced" card.
2.a) First rule of damage control: when you cough up data, you must insist the attacker necessarily used "very sophisticated" or "advanced" techniques even if it involved simply changing the URL to list a different account number.
2.b) Second rule of damage control: when you lose a data tape, you must insist that the data would require a "very sophisticated" or "advanced" computer hardware to actually retrieve the data regardless of how the data was stored.