On 6/13/17 15:51, Bruce Momjian wrote:
> Isn't the leakage controlled by OS permissions, so is it really leakage,
> i.e., if you can see the leakage, you probably have bypassed the OS
> permissions and see the key and data anyway.
One scenario (among many) is when you're done with the disk. If the
content was fully encrypted, then you can just throw it into the trash
or have your provider dispose of it or reuse it. If not, then,
depending on policy, you will have to physically obtain it and burn it.
--
Peter Eisentraut http://www.2ndQuadrant.com/
PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services