![]() The cryptographic implementation exhibited a quite exceptional level of robustness. It is impossible for us to hide security vulnerabilities for marketing or other reasons, because the entire code can be checked by the community at any time.Īll this leads to an outstanding robustness of the cryptographic implementation, which has also been highlighted by auditors:. ![]() We use proven ciphers for encryption, the correct use of which has been audited several times and is also constantly verifiable.Feedback from the community is implemented immediately.The code is constantly adapted to the latest standards.In addition to the actual code, quality metrics from automated tests as well as bug reports are publicly available.Thus, the security of your data is secured on many levels and constantly increased: Thanks to its open source nature, maximum transparency is guaranteed. Thus, since security depends only on the key, there is no disadvantage in publishing the algorithm.Īt the same time, however, open source has many security-enhancing advantages:Įncrypt Cloud Storage With Open Source Software: On the Safe Side With CryptomatorĬryptomator is just such an open source encryption software. (The so-called Kerckhoff's principle.) Named after Auguste Kerckhoffs (1835 – 1903) The security of an encryption process must depend solely on the key and must not be based on the secrecy of the encryption algorithms. This is because the advantages lie in the security-related criteria for the development of the software.īefore we go any further, let’s now briefly look at the following axiom of data encryption (cryptography): Exactly How Open Source Software Increases Your Data SecurityĪt first glance, you don’t “see” the aspects of open source in the software itself. In addition, you even have the option of adapting and further improving the recipe if necessary. To come back to the example with the bar: In fact, it would even be possible for you to mix your own drink.īecause open source allows you to do just that: The instructions and all the ingredients are available. Trust, but Verify – Especially if You Want to Encrypt Sensitive Data in the CloudĪnd it’s exactly this advantage of verification that open source software offers you when you want to encrypt your cloud storage (such as Dropbox). You probably already sense a tendency: The stranger may look nice – and in most cases there is certainly no reason for suspicion.īut you don’t know: What if there is something in the drink that shouldn’t be there?Īnd maybe the old saying comes to your mind: Trust, but verify.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |