On 06/24/2015 07:19 AM, Dennis Lee Bieber wrote:

        Pardon, but that description has me confused. Perhaps I just don't
understand the full use-case.

        Who exactly is supposed to be protected from what? You state "data
senders are supposed to encrypt" which, if the recipient doesn't have the
decryption key, implies the recipient -- isn't the real recipient but just
a transport/storage place until the data is retrieved by the end-user.

You got it. I didn't want to explain any more than necessary. But yes, the recipient just stores the data for the end-user.


        If "you" do the encryption on the storage machine, then you need to
also do the decryption when returning the data to the end-user -- which
means the key is available somewhere on the storage machine, and the local
user might obtain access to it and the stored data.

Right again. A legitimate data owner would encrypt the data. The storage machine is encrypting to protect itself against unwanted exposure to unencrypted malware. Not that they would go looking at the files, but their virus scanner or file indexer might.


        Given the assumptions I'm making, my recommendation is likely to be
something on the nature of: use an OS designed with security at the core of
the file system; each sender has their own login UID, and the file system
is configured to grant r/w access only to the login -- no execute
permissions, no access by someone not logged in as that user, etc.

Yes. This is done for "imaged" systems, but I don't have control over the storage machines.

I'm leaning towards using a random substitution cipher suggested by Devin Jeanpierre. If you see any weaknesses in that solution, I'd like to hear them.

Thanks for your response.


--Randall
--
https://mail.python.org/mailman/listinfo/python-list

Reply via email to