Search

Most Recent Posts

Index of Older Posts

Friday
Mar212014

Privacy and Cloud Storage: The Keys are the Key!

Cloud storage is almost ubiquitous now. Services like Dropbox, Sugar Sync, and Google Drive generally do a good job of keeping files synchronized across computers, iOS, and Android devices. Most services also offer excellent security for your files while they are being transported to and from the cloud storage, but what happens to your flies while they sit on the cloud storage servers?  And do you care?

Let’s use Dropbox as the example, since most of us use them. The connection between your computer and the Dropbox servers uses SSL, and is secure. Once on the drop box servers, they encrypt your data using 256 bit AES (very good). However, who holds the keys, and what they can do with them?

But first, what is a key?  A key is often kept in a small file, or on your “key ring,” and is a string of characters representing, for example, a 256 bit AES key. A bit refers to a single binary unit of information – either 0 or 1; a string of 256 of them is a 256 bit key.  It’s easier to combine the 0 or 1 into alphanumeric characters which makes the string shorter and a little more human-friendly, so 64 hexadecimal characters equals 256 binary characters, or about 43 standard alphanumeric characters (yes, slight liberty taken here). You already have lots of keys on your computer!  They do things like authenticate you when making secure web connections.

Your data is encrypted using the key, and only the key can decrypt your data.  There are lots of variations, including multiple keys, but the basic principle is that if you have the key(s) you can read the data.  By the way, we often talk about keys pleural, as there may be more than one of them in many encryption schemes, but that’s another topic…

Almost every cloud storage provider, including Dropbox, creates and holds the keys. And remember, he/she who holds the keys to your encrypted files is the only one who can read them!  This means that Dropbox can decrypt your files, which is generally good thing, because you want them back.  And they need to decrypt them to do many useful things like share your files with someone else when you create a share or link.

However, it also means that employees at Dropbox are able to decrypt and view your files. They may need to do this, for example, if required by an authorized governmental agency such as the FBI or NSA, or if required by a subpoena for commercial purposes, such as during discovery in a lawsuit.  Dropbox has a reasonably good reputation for attempting to protect your information, and there is no reason to believe that they would share your data except if ordered to do so.  Unless they make a mistake and release it, as they have famously done in the past.  (To be fair, they have significantly upgraded their security since then.) Google does not have such a good reputation with privacy, and until very recently any Google employee could view virtually any email account or any file stored in Google Docs.  They too have improved their security recently, but only following Snowdon's revelations.

So what does this mean, and what would be an alternative?

First, as we noted, in order to provide things like web access to your data, it’s necessary for Dropbox to be able to decrypt your files.  There are some clever (and imperfect) solutions to this problem, but generally it’s much harder to implement sharing, links, and collaboration if the cloud provider doesn’t have your keys.  The whole purpose of services like Dropbox could be seen as sharing and collaboration.  Use of cloud storage while maintaining strict security for sensitive data is really a different business model (and there are, not surprisingly, a whole set of providers whose business is directed to satisfy this need).

Second, what are you storing on Dropbox, and what would happen if someone else got it?  If you are storing your grocery list, you don't care if anyone sees it.  My Dropbox contains many dozens of flying documents, lists of fuel prices, manuals, collections of radiology articles, and other publicly available and generally non-sensitive material.

But what if you are storing your tax return, or perhaps using Dropbox Business or Google Docs to keep your business documents and communication in a way that your employees can collaborate effectively?  Now, your company is hit with a lawsuit, and the other side subpoenas Dropbox or Google to release your files to them.  It happens.  And you and your company may have little control of the process.  Dropbox will be required to follow the appropriate procedures and may or may not notify you, the owner of the data, before releasing it.  Hmmm…. a little less pleasant.

I spoke with a couple of litigators, and they told me that they love when the other side uses email, texts, etc. as it’s a great trail for discovery.  And they hate it when their clients do it.  I’m not sure how many times cloud storage providers have been subpoenaed directly in tort actions, but it’s becoming more and more common.  By the way, if you use Google for your email, then it seems that all your Google Docs come with the “package” that Google releases in response to a court order for either.

Wouldn’t it be better if Dropbox or Google could say:  “Well, we can give you all the encrypted data that we have, but we are unable to decrypt it because we do not have the keys.”  This is why we, as consumers, might not want to have our cloud storage providers hold or have access to our keys. 

But would this be good business for Dropbox or Google?  NO!!  First, they wouldn’t be able to offer the incredibly useful services that they have, and second, your data would be at much greater risk of total, unrecoverable, loss.  This is because if you are the only one who holds the keys and you “loose” them, for whatever reason, then you are out of luck and your data is permanently lost.  Forever.  With no hope for recovery.  The cloud storage provider could not help you.  Really.  This is why being the keeper of the keys is such a big responsibility.  You need to ask yourself: “Am I more concerned with the possibility that my data could be subpoenaed, accidently released, or obtained by the NSA, or am I more concerned with the possibility that I could loose my keys?”  My view: the first rule is protect the data from loss.  Everything else is secondary. 

However, there are probably a few little items for each of us that would be uncomfortable, or worse, if they were to be disclosed.  To anybody.  So, I believe that most of us have need for two different systems or solutions for cloud storage:  one like Dropbox with great features, good security and very little chance of data loss, and a second solution where you, and only you, hold the keys to your cloud data and assume the responsibility for protecting the keys from loss.  Then you have two “shoe boxes” and you, the user, can make a decision based on the sensitivity of the information whether it can go on Dropbox, or needs the bit of extra protection of your “Secure Cloud” solution.

Next post will review the available options that I’ve tried, which ones I have found to work with my Mac-based system, and what my current solution is.  None are perfect.  We will also discuss how to find out who has the keys, and some special situations like those of us working in health care, finance, or law.

 

--Tiron

 

Thursday
Dec192013

Have your email and password been compromised?

 

You should stop what you are doing, and go to HaveIBeenPwned.com.  Here is a quote from the site, put up by Troy Hunt, regarding one of the password breaches -- "the Big One" with 153 million passwords released!

ADOBE:   "In October 2013, 153 million accounts were breached [emphasis mine] with each containing an internal ID, username, email, encrypted password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also disclosed much about the passwords adding further to the risk that hundreds of millions of Adobe customers already faced."

The site also checkes for pwned accounts on 7 other sites as well.  If you find your email on this website, you should immediately change the password to the organization that leaked your password (most likely Adobe), as well as to all other sites that might use that password -- because hackers likely have compromised the password and it's linked to your email account and password hint.  Of course, you never use the same password for two sites, do you?  If you do, then consider using Last Pass or 1Password.

In case you are not familiar with the word "pwned" here is the Wikipedia definition:

Pwn is a leetspeak slang term derived from the verb own,[1][2][3] as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival,[4] used primarily in the Internet-based video game culture to taunt an opponent who has just been soundly defeated (e.g., "You just got pwned!").[5]

In hacker jargon, pwn means to compromise or control, specifically another computer (server or PC), web site, gateway device, or application. It is synonymous with one of the definitions of hacking or cracking, including iOS jailbreaking. The Pwnie Awards are awarded by a group of security researchers.[4]

And no, I'm not sure how to pronounce it!  I think it's pronounced as "owned" with a silent "p."

 

--Tiron

 

Thursday
Dec192013

Worst Password.  Ever.

There have been reports on what has to be the worst password.  Ever.  And maybe the most dangerous too.

00000000

Yes, it appears that eight zeros was the launch code for the Minuteman rockets that carried nuclear warheads.  Seems the military was worried that that when the chips were down, they wouldn't be able to get any fancier passcode through the disrupted communications that they expected after a Russian nuclear strike.

They got away with it for 20 years!

Hopefully, if you're reading this, then you won't be trying similar tricks.  To make matters easier, LastPass and 1Password both have new versions which I will look at shortly!

--Tiron

 

 

Wednesday
Dec182013

The New Mac Pro

Like many, I have waited anxiously for the release of the new Mac Pro.  I still have a nearly 7 year-old Mac Pro, which has never missed a beat.  It's too old to upgrade to the newer operating systems though, and it's been repurposed.

The new Mac Pro is another animal altogether.  I'm undecided on it's merits.  And it is sure expensive. 

  • It's small.  But you have to supplement the machine with lots of peripherals.  I loved that my old Mac Pro, had 4 internal drive bays.  The new Mac Pro will need to be connected to one or more external drives by Thunderbolt.  And no, it's not a realistic option to only use the internal storage.  It's way too small.  You will also likely need an external BluRay/DVD device to read and maybe, if you're old-school, burn disks.  I suspect most Mac Pro users will go for RAID external storage.  So now you have at least doubled the size of the box.  And you've added cable sprawl.
  • It's got Thunderbolt.  Yes!  Unfortunately, however, I've had less than stellar experience with Thunderbolt external drives running on my 27" iMac.  I've tried Western Digital and LaCie.  Both units had trouble mainlining reliable connections, and would sometime need to be unplugged and plugged back in.  I'm not used to doing that for my internal drives.  My experience so far doesn't suggest that they are good for primary storage, though once connected, they seem plenty fast!
  • It's very fast!  But the 27" iMac is no slouch either.  And a lot less expensive!

True, the Mac Pro has got fabulous graphics to support multiple 4K monitors.  But 4K Thunderbolt monitors are around $3,000.  For heavy-duty video editing, I suspect that it will have no equal.  But I'm not stressing my iMac, except with occasional video transcoding.  The only other applications that I run worthy of such a machine are flight simulators.  Given how well the iMac 27" is running, it's hard to imagine why I would want to switch to the Mac Pro, at least until Thunderbolt is ironed-out as reliable primary storage. 

 

--Tiron

 

Wednesday
Dec182013

Tweaking the White Balance on Sony RX-100 and NEX 6

In the previous post I alluded to adjusting the color balance of the Sony cameras, which is helpful but, in my experience, not a cure.  I realized that this is a question that I've been asked before.  The button pushes are a little obtuse, so I thought I'd get it down here:

 

  1. Go to P mode
  2. Press Fn
  3. Using the Right and Left side of the outer dial select AWB (or whatever white balance mode you are currently using) from the options at the bottom of the screen.
  4. Press lower portion of the outer dial to bring up the grid that allows you to bias towards Blue/Amber (horizontal axis) and Green/Magenta (vertical axis).  Use the up/down/right/left portions of the outer ring to make the changes you want, then press the center button.
  5. You can make these adjustments individually for each white balance preset (Auto, Sun, Cloudy, etc.)
  6. The changes stay when selecting different camera modes -- P, A, S, or the Green or Amber "simple" modes.
    1. It's necessary to make the adjustment in something other than the "Green Camera" mode though, which is why the first instruction is to go to the P mode.

 

That's it!  I have experimentd with different settings, and generally use two clicks towards Amber, and mabe one click towards Magents.  I haven't gotten it right.  Any help appreciated!

 

--Tiron