Philly ETE 2017 #32 – Building data breach and subpoena resistant applications – Martin Snyder

by
Tags: , ,
Category:

Now is the time for a new approach to protect the covenant between an application’s owners and its users.

Present threats are too numerous and varied and the battlefield too complex to defend with existing methods. In particular, technical defenses have limited effectiveness against non-technical attacks.

The techniques presented here protect against attacks on all fronts, including from within where a privileged operator is compromised. Together, we’ll examine an application based on cryptography and messaging that sets a new expectation for data security.