1 |
I've been chewing on this idea for a while and am hoping someone on the |
2 |
list may help me with a concern. |
3 |
|
4 |
The notion is that big company B will distribute CDs to employees to use |
5 |
for remotely accessing things like mail, corporate Intranet, etc. The |
6 |
disk contains two bootable images. One is "normal" and is the first to |
7 |
load. The second squashed image is encrypted in a manner that the first |
8 |
image can decrypt. |
9 |
|
10 |
The first image loads, connects to Corp B and authenticates the user. |
11 |
At that point the key to decrypt the second image is provided and the |
12 |
computer chroots to the second image. This environment is considered |
13 |
trusted and access is provided into Corp B. |
14 |
|
15 |
This seems fairly straightforward but then why isn't anyone doing this |
16 |
already? What haven't I considered? |
17 |
|
18 |
It's easy to use the word encryption but is much harder to make it work. |
19 |
Any recommendations on projects I should look at that may be suitable |
20 |
for this purpose? |
21 |
|
22 |
thanks, |
23 |
Jeff |
24 |
|
25 |
________________________________ |
26 |
|
27 |
Jeff Gercken <mailto:jeffg@×××××.com> |
28 |
|
29 |
502-292-4838 office |
30 |
|
31 |
502-292-5238 fax |
32 |
|
33 |
<http://www.kizan.com/> www.kizan.com <http://www.kizan.com/> |
34 |
|
35 |
________________________________ |