![]() When you need a file or files from your backup, you simply connect through the backup provider’s app, navigate to the desired file or folder, and download it. Others buy virtual space from a third party like Amazon, Google, and Rackspace, further complicating where data is stored and who has access. Providers that own their own data centers are preferable as well. Datacenters in the US and European Union are generally more trusted. Not all countries have good privacy laws. If it’s lost, access to the backup is gone forever.įinally, the location of the provider’s data centers also alters who can access user data. If the key is stolen, however, it cannot be changed and the provider is not responsible. That means only the user and those he or she gives the key to can decrypt the data. Those who don’t trust the provider can opt to create their own private encryption key. If hackers or government authorities somehow obtain the key, they also have access. Most providers will store the encryption key on behalf of the user, but that means the provider technically has access to users’ files. One must also ask who can decrypt the data. Some cloud backup providers advertise encryption but really only provide the first form, leaving your data un-encrypted and accessible on the cloud servers. Encryption happens in two forms: during transfer from a computer to the cloud and encryption of the actual data stored on the cloud. To protect data from prying eyes, encryption is required. But not all providers are as vigilant and concerned about privacy as they should be. This is a complex question with many factors.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |