When we hear about flash drives in the context of cybersecurity, we tend to think of them more as threats than as targets. When you’re using flash drives to store encryption keys, however, it makes…
I can’t tell if I communicated badly or I’m really just off the mark. But we already encrypt storage at rest, when we have valuable or sensitive data, because of the risk that thieves might read stolen data.
So take that a step farther. A thief can “know a guy” who spent a few hundred on soldering equipment and watched some tutorials on YouTube. We don’t consider sensitive data to be unavailable to thieves just because it isn’t readable via plug and play.
The opportunity to take you usb drive and copying its content real quick while you are distracted momentarily is eliminated. I can then decrypt it by calling the guy I know.
But I can’t call the guy I know with the $50 setup that can extract the data for me in that time. It’s not 100% unbreakable, but that doesn’t have to be the criteria…
I can’t tell if I communicated badly or I’m really just off the mark. But we already encrypt storage at rest, when we have valuable or sensitive data, because of the risk that thieves might read stolen data.
So take that a step farther. A thief can “know a guy” who spent a few hundred on soldering equipment and watched some tutorials on YouTube. We don’t consider sensitive data to be unavailable to thieves just because it isn’t readable via plug and play.
The opportunity to take you usb drive and copying its content real quick while you are distracted momentarily is eliminated. I can then decrypt it by calling the guy I know.
But I can’t call the guy I know with the $50 setup that can extract the data for me in that time. It’s not 100% unbreakable, but that doesn’t have to be the criteria…
What does any of that have to do with our pedantic argument about the use of the word “resourceful”?