![]() You don’t have to type in the decryption key to do that. You can still open the files on your computer and view them. All of the files that you place into that folder are encrypted before your computer uploads the files to the cloud. They both work by installing a new folder in the Dropbox folder on your computer. I tested Boxcryptor and Sookasa with Dropbox. Thus, even if they were to gain access to your decryption key, they could not access your data. Neither Boxcryptor nor Sookasa will have access to your data because it is stored with your cloud service provider. You choose a password to secure access to that key. Boxcryptor and Sookasa hold the key necessary to decrypt (unlock) the data. Once you encrypt your cloud data with one of these services, the cloud service provider (or anyone else who obtains access to the data) will not be able to read it.īoxcryptor and Sookasa work by encrypting data on your computer before the data is transmitted to the cloud service provider’s servers. You can try out each service for free by downloading their programs from their websites. Each service uses 256 bit AES encryption. There are three services for encrypting data stored in the cloud that I find to be user friendly. However, if you are like me and are always curious about how things work, you can learn more about encryption at: (1) part 1 of 4 in Jason Dean’s blog posts explaining encryption and (2) for good visual examples of how encryption works, pages 26-49 of his PowerPoint presentation. For this post, it is sufficient to say that 256 bit AES encryption works and provides the user with a very strong lock. ![]() ![]() That is good though because if it was simple, the lock would be easy to pick. The strongest type of encryption used in the United States is known as 256 bit AES encryption. “Decryption” unlocks the data and turns the data back into its original, accessible format. ![]() Once the data is encoded with a strong encryption algorithm, a reader can only understand the data by possessing the key necessary to decrypt the data. Nevertheless, because encryption is a relatively easy solution to the problem of cloud service providers having the ability to access or disclose their customers data, it strikes me as a smart business practice to take advantage of that solution.Įncryption is a method of encoding data. Therefore, we do not yet know whether Texas courts will require a user of cloud storage or computing services to take extra precautions to protect the secrecy of their trade secrets. I am not aware of a reported case opinion analyzing how to satisfy that requirement for data stored in the cloud. This is important because the Texas Uniform Trade Secrets Act requires the owner of a trade secret to undertake reasonable steps to maintain the confidentiality of the trade secret. In my last post, I discussed whether data maintained in a cloud storage or computing platform can be said to be confidential. ![]()
0 Comments
Leave a Reply. |