Similar to the virtual drive solution, some products store your encrypted data in the cloud. When you lock the virtual drive, all the files you put into it are completely inaccessible. The other creates a virtual disk drive that, when open, acts like any other drive on your system. One type of product simply processes files and folders, turning them into impenetrable encrypted versions of themselves. The two main approaches in encryption utilities parallel these options. Two Main Approachesīack in the day, if you wanted to keep a document secret you could use a cipher to encrypt it and then burn the original. It does mean that if you encrypt an essential document and then forget the encryption password, you've lost it for good. As my colleague Max Eddy pointed out in a past article about one-time Attorney General Barr's ignorance of encryption, "a backdoor is still a door and even a door with a lock on it can be opened."Īll the products in this roundup explicitly state that they have no back door, and that's as it should be. Why wouldn't Apple help? Because the moment a back door or similar hack exists, it becomes a target, a prize for the bad guys. The FBI had to hire hackers to get into the phone. But no such back door existed, and Apple refused to create one. When the FBI needed information from the San Bernardino shooter's iPhone, they asked Apple for a back door to get past the encryption. Best Hosted Endpoint Protection and Security Software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |