Encrypting with vim
Last week I suggested that application-specific encryption can solve some data confidentiality problems better than a sweeping approach like whole-disk encryption. One thing you learn in Learning Tree’s Linux introduction course, or the Linux server administration course that follows it, or the optimization and troubleshooting course or another follow-up, is that you are never done […]
File System Encryption: When Is It Worthwhile?
Encryption is used to protect confidentiality. But what role should it play within your operating systems for protecting file systems? The answer often is, “it depends.” Physical Theft A laptop or detachable media such as USB-connected external disks and thumbdrives could easily be stolen or lost. Especially with smaller objects, you may not know which […]
Last week I explained why government-imposed backdoors cause more problems than they solve, and government-imposed weaknesses from the 1990s are still causing SSL/TLS security problems. Let’s see some of the other ways backdoors have spectacularly failed. This is nothing new The problem of insider abuse goes back to an era when letters and telegrams were […]
What Could Possibly Go Wrong With Backdoors?
What could possibly go wrong with back doors? Pretty much everything imaginable. You must have seen about the debate between the FBI and Apple over providing a backdoor for the Apple iPhone 5C model. I strongly agree with Michael Hayden, former head of both the Central Intelligence Agency and the National Security Agency. In an […]
The Real Issue Behind a Database Breach
At the end of 2015, databreaches.net reported that someone had accessed a database with 191 million voter records and released it (and someone subsequently removed it) online. The report is well-written and worth a read. There was apparently significant personal information available for each of the voters. The 191 million records seems a bit […]