<?xml version='1.0' encoding='utf-8' ?>

<rss version='2.0' xmlns:lj='http://www.livejournal.org/rss/lj/1.0/' xmlns:atom10='http://www.w3.org/2005/Atom'>
<channel>
  <title>handslive</title>
  <link>https://handslive.dreamwidth.org/</link>
  <description>handslive - Dreamwidth Studios</description>
  <lastBuildDate>Thu, 30 Aug 2018 14:46:41 GMT</lastBuildDate>
  <generator>LiveJournal / Dreamwidth Studios</generator>
  <lj:journal>handslive</lj:journal>
  <lj:journaltype>personal</lj:journaltype>
  <image>
    <url>https://v2.dreamwidth.org/11261164/3037371</url>
    <title>handslive</title>
    <link>https://handslive.dreamwidth.org/</link>
    <width>72</width>
    <height>100</height>
  </image>

<item>
  <guid isPermaLink='true'>https://handslive.dreamwidth.org/87745.html</guid>
  <pubDate>Thu, 30 Aug 2018 14:46:41 GMT</pubDate>
  <title>What does it take to make him post something?</title>
  <link>https://handslive.dreamwidth.org/87745.html</link>
  <description>You may have heard about the &lt;a href=&quot;https://www.cbc.ca/news/business/air-canada-mobile-app-1.4802879&quot;&gt;recent breach at Air Canada&lt;/a&gt;.  Because Air Canada recently purchased Aeroplan, it turns out that I have credentials stored in their service.  I don&apos;t use the app, so I&apos;m not even likely to be part of the subset of users affected.   And that&apos;s not why I&apos;m posting anything here.  Instead, it was &lt;a href=&quot;https://twitter.com/AnnCavoukian/status/1034890393652023298&quot;&gt;a tweet from Ann Cavoukian&lt;/a&gt; stating that the breach wouldn&apos;t have happened if Air Canada had encrypted all of their customer&apos;s data at rest.  And maybe I should tweet something about it?  But my response is not a short aphorism.&lt;br /&gt;&lt;br /&gt;Encryption of data in a case like this is about instituting an additional measure of access control, supplemental to existing controls.  But applications are built of components that are in a sense layered (at least conceptually) on top of each other.  So &lt;em&gt;where&lt;/em&gt; we provide encryption affects what access is protected and how the system overall is affected.  This is meant to be a quick tour, so I`m going to make broad, sweeping generalizations.  This is based heavily on my own experience.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;cut-wrapper&quot;&gt;&lt;span style=&quot;display: none;&quot; id=&quot;span-cuttag___1&quot; class=&quot;cuttag&quot;&gt;&lt;/span&gt;&lt;b class=&quot;cut-open&quot;&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class=&quot;cut-text&quot;&gt;&lt;a href=&quot;https://handslive.dreamwidth.org/87745.html#cutid1&quot;&gt;Application anatomy 101...&lt;/a&gt;&lt;/b&gt;&lt;b class=&quot;cut-close&quot;&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;display: none;&quot; id=&quot;div-cuttag___1&quot; aria-live=&quot;assertive&quot;&gt;&lt;/div&gt;&lt;span class=&quot;cut-wrapper&quot;&gt;&lt;span style=&quot;display: none;&quot; id=&quot;span-cuttag___2&quot; class=&quot;cuttag&quot;&gt;&lt;/span&gt;&lt;b class=&quot;cut-open&quot;&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class=&quot;cut-text&quot;&gt;&lt;a href=&quot;https://handslive.dreamwidth.org/87745.html#cutid2&quot;&gt;Encrypt the file system...&lt;/a&gt;&lt;/b&gt;&lt;b class=&quot;cut-close&quot;&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;display: none;&quot; id=&quot;div-cuttag___2&quot; aria-live=&quot;assertive&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;span class=&quot;cut-wrapper&quot;&gt;&lt;span style=&quot;display: none;&quot; id=&quot;span-cuttag___3&quot; class=&quot;cuttag&quot;&gt;&lt;/span&gt;&lt;b class=&quot;cut-open&quot;&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class=&quot;cut-text&quot;&gt;&lt;a href=&quot;https://handslive.dreamwidth.org/87745.html#cutid3&quot;&gt;Encrypt the database...&lt;/a&gt;&lt;/b&gt;&lt;b class=&quot;cut-close&quot;&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;display: none;&quot; id=&quot;div-cuttag___3&quot; aria-live=&quot;assertive&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;span class=&quot;cut-wrapper&quot;&gt;&lt;span style=&quot;display: none;&quot; id=&quot;span-cuttag___4&quot; class=&quot;cuttag&quot;&gt;&lt;/span&gt;&lt;b class=&quot;cut-open&quot;&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class=&quot;cut-text&quot;&gt;&lt;a href=&quot;https://handslive.dreamwidth.org/87745.html#cutid4&quot;&gt;Encrypt individual data elements...&lt;/a&gt;&lt;/b&gt;&lt;b class=&quot;cut-close&quot;&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;display: none;&quot; id=&quot;div-cuttag___4&quot; aria-live=&quot;assertive&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;cut-wrapper&quot;&gt;&lt;span style=&quot;display: none;&quot; id=&quot;span-cuttag___5&quot; class=&quot;cuttag&quot;&gt;&lt;/span&gt;&lt;b class=&quot;cut-open&quot;&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class=&quot;cut-text&quot;&gt;&lt;a href=&quot;https://handslive.dreamwidth.org/87745.html#cutid5&quot;&gt;Attacking the application...&lt;/a&gt;&lt;/b&gt;&lt;b class=&quot;cut-close&quot;&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;display: none;&quot; id=&quot;div-cuttag___5&quot; aria-live=&quot;assertive&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;cut-wrapper&quot;&gt;&lt;span style=&quot;display: none;&quot; id=&quot;span-cuttag___6&quot; class=&quot;cuttag&quot;&gt;&lt;/span&gt;&lt;b class=&quot;cut-open&quot;&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class=&quot;cut-text&quot;&gt;&lt;a href=&quot;https://handslive.dreamwidth.org/87745.html#cutid6&quot;&gt;Working with your hands tied...&lt;/a&gt;&lt;/b&gt;&lt;b class=&quot;cut-close&quot;&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;display: none;&quot; id=&quot;div-cuttag___6&quot; aria-live=&quot;assertive&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;I do think that some of the content stored by Air Canada could definitely have been encrypted and protected to a level similar to credit card numbers.  Passport numbers and Nexus card numbers, for example.  But to encrypt everything?  That runs the risk of seriously hampering things.  My main point is that encryption isn&apos;t magical security dust that protects against everything.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=handslive&amp;ditemid=87745&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://handslive.dreamwidth.org/87745.html</comments>
  <category>data security</category>
  <lj:mood>geeky</lj:mood>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
</channel>
</rss>
