<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CoderOnline</title>
    <link>https://coderonline.de/security/data_security/</link>
    <description>Recent content on CoderOnline</description>
    <generator>Hugo</generator>
    <language>en</language>
    <atom:link href="https://coderonline.de/security/data_security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Backups: An introduction</title>
      <link>https://coderonline.de/security/data_security/backup-intro/</link>
      <pubDate>Mon, 22 Sep 2014 03:17:12 +0200</pubDate>
      <guid>https://coderonline.de/security/data_security/backup-intro/</guid>
      <description>&lt;h2 id=&#34;online-data-redundancy&#34;&gt;&#xA;  online data redundancy&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#online-data-redundancy&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;Drives fail more often, than one would expect. Google has done a representative&#xA;statistic concerning normal hard disk drives. In the FAQ of LUKS I learned,&#xA;that even SSD&#39;s ain&#39;t guaranteed to last much longer.  Therefore it seems&#xA;wise to have the data saved twice or more in a production environment, where&#xA;three drives seem to be the sweet spot in this manner. Even then your data is&#xA;not safe! The next thunderstorm will come and terrible things are likely to&#xA;happen if a lightning directly hits a power cable in your street. Lightning&#xA;safe plugbars or uninterrupted power supply devices cannot avoid damage in all&#xA;cases and professional grade over voltage protection must also include the&#xA;whole building gets really expensive. It is very likely to be more economical&#xA;to turn your devices off and pause your work while being close to the&#xA;thunderstorm. But there is more: Even a storm on the sun can flip some bits on&#xA;your hard disk or in your random access memory.&lt;/p&gt;</description>
    </item>
    <item>
      <title>know your caches</title>
      <link>https://coderonline.de/security/data_security/caches/</link>
      <pubDate>Wed, 10 Sep 2014 11:24:17 +0200</pubDate>
      <guid>https://coderonline.de/security/data_security/caches/</guid>
      <description>&lt;p&gt;It is somehow alerting how much information can be found in a cache folder.&#xA;I will try to create a list of all caches I could find. This document stays&#xA;work in progress, of cause.&lt;/p&gt;&#xA;&lt;p&gt;But consider how important this is. The caches may contain personal data, such&#xA;as:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;email addresses from your mail program&lt;/li&gt;&#xA;&lt;li&gt;telephone numbers if you synchronize contacts with your mobile phone&lt;/li&gt;&#xA;&lt;li&gt;photos either from your phone, skype, facebook and where ever they were shown&lt;/li&gt;&#xA;&lt;li&gt;which music you have on your computer, because media players automatically&#xA;download cover arts and store them on your disk &lt;em&gt;(also the download could be&#xA;tracked, of cause)&lt;/em&gt;&lt;/li&gt;&#xA;&lt;li&gt;passwords, because some applications even cache passwords :/&lt;/li&gt;&#xA;&lt;li&gt;all your personal photos and every movie you have got on your disk, because&#xA;many image viewers and filemanagers will create thumbnails for them.&lt;/li&gt;&#xA;&lt;li&gt;visited websites can be found in your browser caches.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;browser-caches&#34;&gt;&#xA;  Browser Caches&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#browser-caches&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h3&gt;&#xA;&lt;p&gt;&lt;code&gt;$HOME/.cache/chromium/&lt;/code&gt;&lt;br /&gt;&#xA;&lt;code&gt;$HOME/.cache/mozilla/&lt;/code&gt;&lt;br /&gt;&#xA;&lt;code&gt;$HOME/.cache/midori/&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>disk encryption</title>
      <link>https://coderonline.de/security/data_security/disk_encryption/</link>
      <pubDate>Fri, 29 Aug 2014 05:57:45 +0200</pubDate>
      <guid>https://coderonline.de/security/data_security/disk_encryption/</guid>
      <description>&lt;h1 id=&#34;ratio-why&#34;&gt;&#xA;  Ratio: Why?&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#ratio-why&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;Encryption comes at a price: You will have to spend time on it, because&#xA;you have to decide how to do it and you will permanently use computing&#xA;resources when using it. But what seems to be unattractive can pay out&#xA;in situations, when your drive can be accessed by any foreigners, which&#xA;might include:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;a person who has stolen it from you&lt;/li&gt;&#xA;&lt;li&gt;if your drive has failed and you returned it for guarantee the&#xA;manufacturer will not repair exactly your drive, but will in most&#xA;cases collect them and send you an already repaired drive back,&#xA;which someone else had sent in before&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;choosing-an-encryption-algorithm&#34;&gt;&#xA;  Choosing an encryption algorithm&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#choosing-an-encryption-algorithm&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;This really is a problem, because you never know which algorithm will be&#xA;proven to be insecure tomorrow. Sadly the cryptsetup command expects a&#xA;not well documented format for its --cipher parameter. The man page&#xA;just says that it defaults to &lt;code&gt;aes-xts-plain64&lt;/code&gt; when using &lt;code&gt;LUKS&lt;/code&gt;. I&#xA;found two methods to find out which encryptions are supported by your&#xA;kernel. First &lt;em&gt;and recommend&lt;/em&gt; is the usage of&lt;/p&gt;</description>
    </item>
    <item>
      <title></title>
      <link>https://coderonline.de/security/data_security/veracrypt/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://coderonline.de/security/data_security/veracrypt/</guid>
      <description>&lt;p&gt;Veracrypt is currently the only encryption software I am aware of, which runs&#xA;under Windows, Linux and BSD. That makes it a good choice for external storage&#xA;devices. Web: &lt;a href=&#34;https://www.veracrypt.fr/&#34;&gt;veracrypt&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;A really cool feature veracrypt offers is nested encryption.&lt;/p&gt;&#xA;&lt;h1 id=&#34;first-steps&#34;&gt;&#xA;  First steps&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#first-steps&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;Veracrypt comes with a GUI interface, which is not beginner friendly, but&#xA;does its job. I will however concentrate on the command line interface,&#xA;which is better called with &lt;code&gt;-t&lt;/code&gt; as first parameter, because even&#xA;&lt;code&gt;veracrypt -t --help&lt;/code&gt; would otherwise show its help in a window.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
