myself, I was agreeing with you and merely reinforcing your own point.
Was the data not scrubbed of any identifying information (Surname, dob, phone number, address) BEFORE handing it to an american company?
I work with US info every day and if it's real data, then it MUST be scrubbed of such details. Data Protection and all that.
Some more details on the people affected and encryption used on the [broken link removed].
I'd be worried about identity theft - setting up of credit cards or mobile phone accounts etc using the stolen identities.
This doesn't mean much if, for example, access to the decryption process was secured using only a simple password which, once found/guessed, would give full access to the data. If they wanted to be transparent then they really should have explained what specific tools/technologies were used here. The lack of such detail raises as many questions as it answers.state-of-the-art data encryption was used. The records were on a CD that was encrypted with a 256 bit encryption key.
Sounds like they were copied in the clear and then re-encrypted in which case temporary copies of the data in the clear could remain on the hard disk.These records were transferred to a laptop and re-encrypted with an AES 256 bit encryption key.
Actually - here's another interesting strategy for getting at encrypted data!