Monday, July 29, 2013

"I'm not ashamed. Cowards live longer."

Security.
In information security there are surprisingly few options. Generally it comes down to encryption, either of specific files and folders or of entire hard drives or flash sticks. It is quite sensible if you have information you would rather keep secret.

Lately, there has been a blooming of applications that allow the tracking and monitoring of stolen devices, even Avast! has a free solution for Android devices. If the device is stolen, its location can be tracked from a web browser using your account linked to the device, and if lucky, the camera might be opportune enough to give additional useful information. This is a great way to get your stuff back from ignorant thieves. It does not, however, help in the case of thieves that can anticipate it. The crux is that it only works if the thief tries to use the device with no previous fiddling.

In the case of computers (pun intended), the hard drive can be taken out and connected to an another computer, thus effectively not starting or running the tracking application. All not encrypted information can be accessed with ease, as would be the case if a Live CD or a Live DVD (or a stick, for that matter) were entered to the original device and an OS was run from that, so an another computer would not be necessary. This is what I imagine would be the least care taken by crooks to make sure they don't get caught, nevertheless there are plenty of cases where thieves check their own Facebook profiles on random computers, even in the house they are burgling in.

To keep your data safe from any prying eyes, you have to hide the information, that means encrypting it. Encrypting single files is good, but having single encrypted files on your data storage device causes unwanted attention on them. Encrypting the whole hard drive, a feature that does not rely on random applications, but rather included in the BIOS, is a neat alternative. It has its downsides, such as in the case of a computer failure, recovering your own data could prove to be troublesome. But that is exactly why we have encrypted spare copies of the important stuff. Encrypting your storage devices and important files on them adds that extra bit of security. Though the only reason why you would need that much information is when you really, really want nobody besides you to ever get to the information your have.

The popular 'activate-when-stolen' applications are neat, but they only work if the criminal is ignorant. Fortunately many of them are, especially those that are opportunistic in their nature. They could help get your device back, but they do not protect the information (passwords, files) stored on that device. To protect those, you have to turn the applications effectively impotent. That means you are unlikely to get your device back, but at the very least your data is safe - the device will be rather useless to the thieves unless they make a complete wipe. Then again, as with humans, two can keep a secret if one of them is dead. The question is, would you rather have your device back from a stupid crook or protect it from all crooks?



No comments:

Post a Comment