Gary is an attorney and has heard of a business product called LockBin that promises to encrypt his data. Is it legit? Leo says that there are limits of privacy with an encryption service. If the service can give him his password, then it has access to all his data and it's not really reliable. If they can't give him the password because only he knows it, then he's in good shape. The downside, though, is that if he forgets it, he's out of luck.
Brian wants to know how safe online encryption is. Leo says that as long as he has the only encryption key, he's safe. But if he doesn't even trust that, then Leo suggests using his own Network Attached Storage. Leo uses Synology, and he syncs it to all his computers using the web.
Mike is wondering how good the encryption is in Microsoft Word and Excel documents. Leo says it's actually pretty good and that it's adequate, but not uncrackable. Leo says it's hard to crack stuff on the web when a service can slow the attacker down. But if someone can get a document that's locked and own it, there's nothing to stop them from trying a million passwords a second, and brute-force that document. Having said that, Microsoft has started using strong encryption on documents. The weak link will be the password.
Mike wants to wipe a hybrid SSD using Darik's Boot and Nuke (DBAN). Is that a good idea? Leo says that SSDs are written to differently than spinning drives, and it also uses a technique called "wear leveling," which writes sectors randomly. This makes it difficult to fully and securely wipe a drive to prevent it from being recovered. He can do it to erase a drive, but it won't really remove the data. That's why Leo recommends encryption. Using BitLocker on Windows, or some other technique to secure data with encryption.
Christian is installing new computers at his accounting company. He's going to be transferring the data from one computer to another and wants to know if Google Drive will work. Leo says absolutely not. There are serious privacy issues handling a client's financial information and personal details. Carbonite is a better option that is encrypted. He'll want to be sure that the data is not only encrypted at the destination but also in transit and that the keys are well controlled, ideally only by him.
In the wake of the Texas church shooting, the FBI and the DOJ have discovered that the shooter's iPhone was encrypted. Deputy Attorney General Rod Rosenstein says that "iPhone encryption costs lives."
Read the full story at arstechnica.com.
You may have heard about the latest Wi-Fi vulnerability in the news called “KRACK” or “Key Reinstallation Attack.” This is a security flaw in the WPA2 protocol that could allow a third party to intercept network activity between a router and a device. It does this by taking advantage of a problem with the way the client (your mobile device or computer) authenticates with the access point (the router).
Byron helps seniors with technology and he suggests getting an iPhone and using dynamic type because it will make the fonts larger. They can also FaceTime with the grand kids. Leo says that accessibility on the iPhone is the best in the business.
Chris has a DVR with a lot of programs on it. Can he back them up before he changes companies? Leo says no. The programming is heavily encrypted because of copy protection. The only real way he can do it is by exploiting the analog hole. If his DVR has an analog connection, he can put a VCR in between the DVR and the TV connection. But he'll be recording in real time and it won't be in HD.