![]() ![]() The problem is that there are 2 functionList.xml files, in: #Xml notepad deutsch how to For example, let’s take a heavily guarded mansion. ![]() Inside that heavily guarded mansion is a vault with very important information on a random topic. For the purpose of the discussion, let us say that the vault can’t be broken in. ![]() You can’t picklock it and you can’t blow the doors open. The only way to get in or out is by using keys. In case there are 2 keys: One key is with the owner and the other key is with the guards in the mansion. If thieves wanted to get that information from the vault they would first have to steal the key from the guards and then just open the vault. In case there’s one key: The only key is with the owner and owner is not in the mansion. If thieves were already in the mansion there’s no way that they could have opened that vault, no matter what. Translating Zero Knowledge Encryption To A Cloud Service Now let us try to translate that case into a cloud service platform. The case where there were 2 keys would represent cloud services with no zero knowledge platform. Cloud services like that might encrypt and protect your files, however, they own the keys to your files as well. Your files can be accessed by people that have high authority in that company. If there’s a breach in the system, either by a hacker or an insider, they can just steal the keys and have access to your information(just like with the vault).Īnd the case with one key would represent the cloud services with a zero knowledge platform. Since the cloud company doesn’t have the keys to your files there’s no way that your files can get compromised. Even if there’s a security breach your files will stay safe since you’re the only one that can open them. No matter how good internet services protected their servers and files in the past, a breach happened anyways, which resulted in a major exposure of people’s files. The files that were lost or either exposed included: photos, videos, private and business information like credit cards numbers, phone numbers, addresses, various legal documents and so on.Īccording to only in the year of 2015, there were 1,673 breaches which resulted in 707,509,815 records breached in total. Based health insurance company was attacked in January 2015. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |