With an encrypted file system, why is one process able to see it but another cannot? Did you mean to imply that this other process only ran at times that the other program wasn't in memory and the file system wasn't mounted? The question seemed to assume that the rogue process would run concurrently with the process with the secrets and with the ability to peek at the memory of the process with the secrets. Wouldn't a process with that sort of rights also have access to any file system the other process did? What of getting the secret from the program that has the unencrypted data before it goes encrypted?
|