text
stringlengths 1
100k
|
---|
The key’s value does not change over time. |
To implement key rotation, key servers usually append some metadata to the identity—for example, the date or rotation group number—thus creating a new identity for a new key. |
To access a key, a user first authenticates and then requests the key associated with an identity. |
If authorized, the key server retrieves the existing key and provides it to the user. |
Static key servers work well when the number of keys required over a system’s lifetime is in the low millions. |
As mentioned earlier, this capacity is more than sufficient for data-at-rest scenarios. |
Consider protecting every spindle of a 10 petabyte disk array: using four terrabyte drives at RAID 5 (20% redundancy) requires 3,215 drives. |
Rotating keys once a month requires 375,000 keys over the course of ten years. |
This is easily supported by static key servers with storage limits of 1 or 2 million keys. |
In this corner: Mr. |
Dynamic
A dynamic key server also generates a key for an identity pattern, but it does not store that key. |
Access to a key works the same way as with a static key server, except the key is generated again for subsequent retrieval. |
A dynamic key server depends on a functional derivation per identity for a key: If the same identity is presented multiple times, the same key will be generated. |
Continuing further, a dynamic key server supports automatic key rotation by appending a time to the identity. |
If rotation is defined for a particular key, the dynamic server will automatically calculate at what time to deliver what key. |
There is no need for the application or user to keep track of what rotation is needed for a particular use case. |
In this way, a dynamic key server allows more automation. |
Example: Why securing mail with static key servers is difficult
Do you remember the release of Pretty Good Privacy (PGP) in the early '90s? |
PGP was created and given away for free by Phil Zimmermann in response to federal intentions to require back doors in secure communications equipment. |
PGP uses public-private key pairs to prevent accidental disclosure of an encrypted communication. |
If a message is sent to three recipients, it is encrypted three different times and sent to three different destinations. |
That way each message may be decrypted only via the private key of the intended recipient. |
This blocks disclosure if a message arrives in the custody of an unintended recipient. |
While revolutionary at its introduction, this scheme did not scale well with the growth of email. |
Imagine an email distributed to a hundred, a thousand, or even more recipients. |
Encrypting a unique copy of the message using the public key of each recipient places a tremendous computation, security, and storage burden on the email system, especially with static key management. |
Now let’s consider an alternative scenario where the sender and the recipient list are the key identities when generating a message encryption key. |
A message sent from Alice to Bob and Chris would use a different key than one sent from Alice to just Chris. |
We now may use symmetric keys, since Bob would not be authorized to receive a key for a message where he is not a recipient. |
Using this scheme, the email system can send the same message to multiple recipients. |
And each recipient decrypts the message with the same symmetric key. |
We prevent accidental disclosure by simply not providing the decryption key to users who are not message recipients. |
This scheme, which does scale well, is know as identity-based encryption. |
Using symmetric keys solves the scaling problem for the email system but not the limits of a static key server. |
For this scenario to work in practice, we must instead use a dynamic key server. |
Consider a user who sends a hundred emails a day. |
Suppose 80% of these emails are replies, while 20% are new messages. |
This implies that one user generates about 20 unique new recipient lists per day. |
Thus, a single user generates 100 unique identity patterns per workweek. |
A one-week rotation policy results in 5,200 unique keys per year. |
Multiply this by 500 mailboxes, and we quickly exhaust the 2 million-key limit of most static key servers. |
This example shows why dynamic key servers are more useful for high-volume data protection applications. |
Know what key server is best for your application
Now, I'm not saying that static key managers are useless. |
Quite the contrary; for some applications, such as data-at-rest protection of hard disk farms, they're perfectly fine. |
But if your organization either depends on, is starting to depend on, or will depend on a big data or IoT project, carefully weigh the risks of not using a dynamic key server. |
Limiting the number of keys in the system because the key server can't handle enough is too risky. |
If you don't believe me, wait until you read about the upcoming data breach in next week's paper. |
[ Partner resource: Take Security Journey's first two white belt modules for free ] |
Over the last few months Fox has slowly been pulling its shows from Netflix. |
It started with popular shows such as “Bob’s Burgers” and has continued. |
Now in August we will see even more Fox shows leave Netflix including the remaining Fox-owned seasons of “American Dad.”
This all seems to be caused by Fox’s new deal with Hulu, which they are part owners of. |
Recently Fox announced it would be added 3,000 more episodes to Hulu including many shows that are currently on Netflix such as “American Dad.”
There are still many questions including what about Fox-owned shows such as “Bones” that are currently still on Netflix and have not had any date set for them to leave the streaming service. |
What we do know is that at some point this year they will be on Hulu. |
So what are your options now if you are a Fox fan? |
There is, of course, Hulu because many of these shows will be moving to Hulu soon; however, if you don’t want to subscribe to Hulu the following are a few options. |
Fox Apps
Fox has apps on many popular streaming services. |
You won’t get a ton of content, but it does offer a small selection of Fox shows for free. |
To find the Fox Now apps, just search your app store. |
(More shows are available if you have a cable login.) |
Season Pass
If you only want one or two Fox shows, the least expensive way to get them is a season pass from iTunes, Amazon, Vudu, or one of many other services out there. |
Live TV
If you want to watch Fox live the best way is with an antenna. |
About 90% of Americans can get Fox 100% free over the air. |
Not sure if you get Fox where you live? |
Go to AntennaRecommendations.com and enter your address to see what you can get. |
If you add a DVR to your antenna, you can quickly build up a large catalog of 100% free Fox shows. |
Can’t get Fox over the air? |
If you cannot get Fox for free over the air we have good news for you. |
Fox is streamed for free on services such as Sling TV, PlayStation Vue, and DIRECTV NOW. |
Not sure if they offer it in your area? |
Visit their sites to see if you can find out if they have Fox in your area. |
Not only will you get a live feed of Fox in many areas, all of these services offer on-demand access to many Fox shows. |
Hopefully that helps you find the shows you want now that Fox shows are leaving Netflix. |
Please follow us on Facebook and Twitter for more news, tips, and reviews. |
Need cord cutting tech support? |
Join our new Cord Cutting Tech Support Facebook Group for help. |
The mind-numbing Case-Shiller regional charts below are presented without too much comment. |
The visual says it all. |
Bottom line:
Q: If 2006/07 was the peak of the largest housing bubble in history with affordability never better vis a’ vis exotic loans; easy availability of credit; unemployment in the 4%’s; the total workforce at record highs; and growing wages, then what do you call “now” with house prices at or above 2006 levels; worse affordability; tighter credit; higher unemployment; a weakening total workforce; and shrinking wages? |
A: Whatever you call it, it’s a greater thing than the Bubble 1.0 peak. |
1) Funny (and Demented) Seattle area Realtor anecdote regarding the potential for another housing Bubble: “House prices can’t be in a bubble because they are only 10% greater than the 2006 peak, meaning growth of only 1% per year since 2006. |
And 1% per year is not the Bubble type gains we saw back in the mid-2000’s”. |
DOH! |
How do you argue with that? |
You don’t, you just turn the other cheek and pound a drink. |
2) Case-Shiller’s most Bubblicious Regions
Bottom line: If these key housing markets hit a wall they will take the rest of the nation with them; bubbles and busts don’t happen in “isolation”. |
Not shown in these charts of absolute index levels is the three-straight months of national yy price gain deceleration. |
Moreover, the CS captures prices up to 7-months old at the tail so conditions are already a lot different than shown here. |
3) Notes & Observations on above chart:
• The bubblicious regions above all have one thing in common…STEM. |
As such, if the tech and biotech sectors hit a wall, which some believe has already begun, so will these housing regions. |
• If these key housing markets hit a wall they will take the rest of the nation with them; Bubbles and busts don’t happen in “isolation”. |
• House prices have retaken Bubble 1.0 levels on the exact same drivers: easy/cheap/deep credit & liquidity that found its way to real estate. |
The only difference between both era’s is which cohorts controlled the credit and liquidity. |
In Bubble 1.0, end-users were in control. |
In this bubble, “professional”/private investors and foreigners are. |
But, they both drove demand and prices in the exact same manner. |
That is, as incremental buyers with easy/cheap/deep credit & liquidity, able to hit whatever the ask price was, and consequently — due to the US comparable sales appraisal process — pushed all house prices to levels far beyond what typical end-user, shelter-buyers can afford. |
Thus, the persistent, anemic demand. |
• Bubble 2.0 has occurred without a corresponding demand surge just like peak Bubble 1.0. |
As such, it means something other than fundamental, end-user demand and economics is driving prices this time too. |
• The end result of Bubble 2.0 will be the same as 1.0; a demand “mix-shift” and price “reset” back towards end-user fundamentals once the speculators finish up, or events force them to the “sidelines”. |