create account

RE: Securely Storing Data Backups on the STEEM Blockchain by builderofcastles

View this thread on: hive.blogpeakd.comecency.com

Viewing a response to: @lukestokes/securely-storing-data-backups-on-the-steem-blockchain

· @builderofcastles ·
I do not know about using a generated password for this.
As, many of the cases where you would need this file, that password manager would probably be destroyed.

Also, if you wanted to be really secure, right your own compression algorithm.   If they know you used PGP, then all they have to do is find the password.  If you role your own, they have to find the password and how you encrypted it.

The using a book encoding technique, a word in your file becomes the page, line & word numbers in your encryption is very very strong.  It is only broken by repeated usage and more than one person knowing which book.
properties (22)
authorbuilderofcastles
permlinkre-lukestokes-securely-storing-data-backups-on-the-steem-blockchain-20180223t174052844z
categoryencryption
json_metadata{"tags":["encryption"],"app":"steemit/0.1"}
created2018-02-23 17:41:24
last_update2018-02-23 17:41:24
depth1
children4
last_payout2018-03-02 17:41:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length615
author_reputation277,933,729,617,359
root_title"Securely Storing Data Backups on the STEEM Blockchain"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id39,920,063
net_rshares0
@lukestokes · (edited)
"roll your own" is universally one of the worst pieces of advice in the encryption space. If you don't believe me, ask anyone familiar with that space or just look at history.

I'm all for one-time pads, but you're still having to secure the "password" or the key you used. If my password manager was every compromised, then I'd be screwed anyway. Files that don't need to be stored in a password manager because they aren't super important secrets can be encrypted and stored just fine on a blockchain. Again, in this case, there was nothing super secret about the data, other than putting it out there in plaintext would be kind of silly (and meaningless to others).
👍  
properties (23)
authorlukestokes
permlinkre-builderofcastles-re-lukestokes-securely-storing-data-backups-on-the-steem-blockchain-20180223t181635690z
categoryencryption
json_metadata{"tags":["encryption"],"app":"steemit/0.1"}
created2018-02-23 18:16:36
last_update2018-02-23 18:24:54
depth2
children1
last_payout2018-03-02 18:16:36
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length668
author_reputation555,781,629,106,002
root_title"Securely Storing Data Backups on the STEEM Blockchain"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id39,926,480
net_rshares583,727,427
author_curate_reward""
vote details (1)
@builderofcastles ·
I can see your point, as I have seen people "encrypt" credit card data by adding an extra number to the end of them.  (In a large charity)

However, from my brain type, encryption algorithms are pretty straight forward to me.  And how computers implement them is very straight forward to me.

So, maybe my statement is not for anyone other than me, and people I like to talk to.
properties (22)
authorbuilderofcastles
permlinkre-lukestokes-re-builderofcastles-re-lukestokes-securely-storing-data-backups-on-the-steem-blockchain-20180223t190550870z
categoryencryption
json_metadata{"tags":["encryption"],"app":"steemit/0.1"}
created2018-02-23 19:06:21
last_update2018-02-23 19:06:21
depth3
children0
last_payout2018-03-02 19:06:21
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length378
author_reputation277,933,729,617,359
root_title"Securely Storing Data Backups on the STEEM Blockchain"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id39,935,758
net_rshares0
@omnicolor ·
$0.71
Rolling your own encryption is most likely going to be less secure than using established crypto. The chances of a security expert getting crypto right when designing a new algorithm are pretty slim. Yes, the key to decrypt the data might get found, but the likelihood of that, compared to a developer not being as smart as they think they are is not a tradeoff anyone should take.
👍  
properties (23)
authoromnicolor
permlinkre-builderofcastles-re-lukestokes-securely-storing-data-backups-on-the-steem-blockchain-20180223t175339768z
categoryencryption
json_metadata{"tags":["encryption"],"app":"steemit/0.1"}
created2018-02-23 17:53:36
last_update2018-02-23 17:53:36
depth2
children1
last_payout2018-03-02 17:53:36
cashout_time1969-12-31 23:59:59
total_payout_value0.591 HBD
curator_payout_value0.117 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length381
author_reputation207,218,145,392
root_title"Securely Storing Data Backups on the STEEM Blockchain"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id39,922,286
net_rshares132,018,673,770
author_curate_reward""
vote details (1)
@lukestokes ·
Well said, sir. :)
properties (22)
authorlukestokes
permlinkre-omnicolor-re-builderofcastles-re-lukestokes-securely-storing-data-backups-on-the-steem-blockchain-20180223t181700151z
categoryencryption
json_metadata{"tags":["encryption"],"app":"steemit/0.1"}
created2018-02-23 18:17:00
last_update2018-02-23 18:17:00
depth3
children0
last_payout2018-03-02 18:17:00
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length18
author_reputation555,781,629,106,002
root_title"Securely Storing Data Backups on the STEEM Blockchain"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id39,926,558
net_rshares0