1 00:00:01,670 --> 00:00:08,380 Well number three if a bad guy has unrestricted physical access to your computer it's not your computer 2 00:00:08,380 --> 00:00:09,480 anymore. 3 00:00:09,820 --> 00:00:13,000 When this principle was created it was 100 percent true. 4 00:00:15,500 --> 00:00:19,820 During one of the pre-vis modules we've learned that if someone is able to run his own operating system 5 00:00:19,820 --> 00:00:28,320 on a computer he can change the administrator password of the computer. 6 00:00:28,330 --> 00:00:31,080 You can also remove his hard drive and make a copy of it. 7 00:00:33,490 --> 00:00:35,500 Nothing can stop him from doing that. 8 00:00:38,800 --> 00:00:43,660 At present the situation is different things to software that enables you to encrypt whole hard drives 9 00:00:44,140 --> 00:00:45,650 system partitions included 10 00:00:49,250 --> 00:00:55,010 full encryptions prevent unauthorized people from reading and modifying hard drive contents even if 11 00:00:55,010 --> 00:00:57,230 they have physical access to the hard drive. 12 00:01:00,720 --> 00:01:05,920 If the encryption mechanism was well designed every modification attempt would be a blind guess. 13 00:01:08,050 --> 00:01:11,280 Even so we can state that the third law is still valid. 14 00:01:19,950 --> 00:01:30,150 To encrypt data you need a key the same key is needed for decryption uses for automatic encryption. 15 00:01:30,150 --> 00:01:30,790 The most 16 00:01:33,540 --> 00:01:39,840 they also prefer not to type long strings of symbols every time they start the system in the case of 17 00:01:39,840 --> 00:01:47,380 automatic encryption the decryption key is saved and the system from person gets physical access to 18 00:01:47,380 --> 00:01:47,920 a computer. 19 00:01:47,920 --> 00:01:52,500 They also get access to the key having the key. 20 00:01:52,540 --> 00:01:57,190 There would easily decrypt and read the data. 21 00:01:57,230 --> 00:02:03,980 The third law is still largely valid despite modern solutions were discussed the exception is when the 22 00:02:03,980 --> 00:02:07,660 decryption key isn't stored on the computer or the storage is secured. 23 00:02:08,430 --> 00:02:10,920 The T.P. and most computers are suited with nowadays. 24 00:02:10,920 --> 00:02:14,510 Gives you this possibility. 25 00:02:14,730 --> 00:02:17,610 We will elaborate on that more in one of the next modules.