• 4 Posts
  • 56 Comments
Joined 2 years ago
cake
Cake day: July 5th, 2023

help-circle
  • Cybersecurity engineer here, these are all great answers I just wanted to add a couple tidbits.

    • Where are the keys stored: In enterprise level security, you never want to store your key in the same system you are securing, so you normally use a “Key manager” or an “HSM” (Hardware security module) These are hardened appliances dedicated to generate keys and store them, then other devices that then use protocols such as KMIP or API calls to retrieve them remotely. The key is encrypted in transfer and never stored permanently in the client that is being encrypted. There’s also a key encryption mechanism … but let’s not goo too far into it. I’ll just mention that there’s usually a data encryption key (DEK) and a Key Encryption Key (KEK) and the DEK is never exposed. HSMs themselves are basically physical key managers that have a tamper proof crypto module built in. Think of them as TPM2 on steroids. If you want to read more about these guys check out the FIPS specification that they’re built to. https://en.wikipedia.org/wiki/FIPS_140-3

    • How does the OS know which key to use: It doesn’t There is usually overlay software than handles this part, typically called an “encryption agent” that runs in the kernel space. Even tho most software is based on open source, encryption agents are usually very complex and secretive. My company’s filesystem encryption agent for example embeds 4Kb of metadata on every file with the name of the key that was used to encrypt it to prevent double encryption and help in file restoration. When a file request comes into the OS, we are loaded into the kernel and use a “filter driver” to decide if the file is encrypted or not, and if it’s encrypted, we route the file request to a virtual file system that then pipes it to our software for processing ACLs and decryption. If you want to learn more you can check out this brochure. https://cpl.thalesgroup.com/encryption/transparent-encryption

    Happy to answer any questions.





  • Interesting, thanks for sharing.

    Any clue what the power draw on the disk array is? I did some basic measurement with the kill-a-watt and a spinner takes about 6-7W where as an SSD takes about 2, the price difference is too much for my use case tho, performance per watt per TB, I’m better off with 1 single disk (or a mirror pair) of 6 TB in spinning rust.

    I’m not particularly concerned about data security since I’m syncing evrything 3 ways. Whenever one of the drive fails I’ll consider it a “surprise disaster recovery exercise” XD












  • My previous experience is with dropbox and onedrive and I tend to limit bandwidth … I want sync to happen in the background. It’s not something I usually consider “high priority”

    I found NC to be a lot more flexible and complete, specially with all the machine learning options. I also appreciate the privacy and price Hosting about 7TB of data for $10 worth of power a month and a $150 investment that allows me to host many other things.

    The web interface in my case is a bit slow initially but that’s mostly because I opted to route it via pangolin reverse proxy / cloud flare tunnels, but I notice once the redis cache DB loads it’s blazing fast.

    Overall I’m pretty happy with the speed, I’m sharing this with a family of 15 and I haven’t heard any complaints yet.






  • Good point. I actually have a watt meter coming in the mail tomorrow. Will measure the idle consumption of the r430 and report back. This thing sits mostly at under 10% except when running backups or the machine learning algos for nextcloud image recognition.

    <!–StartFragment–>

    https://files.catbox.moe/70kvz0.png

    <!–EndFragment–>