0_kit End to End encryption in your app

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Secure SharePoint mobile connectivity
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
MITP 458 Application Layer Security By Techjocks.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Sessions about to start – Get your rig on!. Notes from the field – Implement Hybrid Search and OneDrive for Business Chris Zhong - Microsoft Aaron Dinnage.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Security Testing Case Study 360logica Software Testing Services.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Software Security Seminar - 1 Chapter 10. Using Algorithms 조미성 Applied Cryptography.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
1 Good Dynamics & IBM Worklight integration May 2013.
TRANSITIONING FULL TRUST CODE TO CLIENT APIS Architecting SharePoint For The Future Chris Domino December 10, 2015.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
SafeNet The Foundation of Information Security Zen and the Art of Data Protection Preparing for the Evolution Adel Hajrasuliha – Regional Account Manager.
#SummitNow Managing Mobile Content Wednesday 13 th November 2013 Mike Hatfield, Lead Engineer Mobile Apps, Alfresco Marc Dubresson, Dir. Mobile Product.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Technology to Protect Crown Jewels. Purpose This pack draws out extreme examples for protecting the Crown Jewels. The purpose of examining these extremes.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Data Security with Power BI, SSAS, SQL Server 2016 and Active Directory June 10, 2017.
Searchable Encryption in Cloud
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
Enterprise Town Hall solution
Embed Power BI in your Web application
Secure Sockets Layer (SSL)
Challenge, Simplify, Empower
Who am I Hector Villafuerte
A Wireless LAN Security Protocol
Information Protection
Power BI Security Best Practices
PowerApps and Microsoft Flow for Business Users
0x - Lecture Title Andrew Connell, MVP
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
1Z0-477 VCE Questions
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
9/19/2018 8:20 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
2017 Real Questions
An Innovative Distributive Training and Information Platform
Running on the Powerful Microsoft Azure Platform,
Uses Of Encryption Algorithms
Enabling Encryption for Data at Rest
Identity Processor Secures IoT Systems
Enabling Encryption for Data at Rest
CS691 M2009 Semester Project PHILIP HUYNH
Thomson Reuters Contributions Channel
Reactive Android Development
The Most Secure Cloud Storage Provider
Reactive Android Development
Assignment #4 – Solutions
Cloud Computing and its Implementation
RKL Remote key loading.
An Introduction to Cloud Computing
+ Attach service request
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Searchable Encryption
Globally interconnected 6lowPAN
敦群數位科技有限公司(vanGene Digital Inc.) 游家德(Jade Yu.)
System Center Configuration Manager Cloud Services – Cloud Distribution Point Presented By: Ginu Tausif.
COEN 351 Authentication.
Western Mass Microsoft Technology Users Group
Alena Reinaldo Cristel Randy
Cognitive Security Diagram Template
MicroToken Exchange Data Security Solutions
Presentation transcript:

0_kit End to End encryption in your app 2016. 11. 21. Mihály Lengyel Developer

A bit of background Tresorit is a secure cloud file storage solution Zero Knowledge We don’t know your password – not even a hash We don’t know your keys – we can’t be forced to give it up We don’t know your data – even a filename leak is a breach Without all the marketing stuff: Both key management and encryption is done on the client

The problem

Channel + “at rest” encryption Storage Server Mallory ? ?

Channel + “at rest” encryption Storage Server Mallory

Client-side Encryption ? Mallory Alice ? Storage Server ? Mallory Bob

Solutions Cloud On-premise srv Client device DRM Key mgmt Encrypt at More keys Complexity Encrypt at Key mgmt Cloud On-premise srv Client device “At-rest” + “In-transit” At-rest + on-prem HSM Session-based encryption CASB encryption gateway DRM Full-disc encryption On-premise DRM Client-side encryption More platforms

Our solution – Zero Kit A building block, embedded into your application Working insides iframes seamlessly blended into your app

Architectural view 0_kit Service Your back-end REST APIs Your database User data, encrypted Approval of client-side operations without exposing user content Enforce business logic on server (e.g. who can share with whom) User profiles Client-side encrypted keys Your browser/mobile app 0_kit client library Zero Knowledge User authentication Key management Encrypt, Decrypt, Share

0_kit End to End encryption in your app To try it contact: dave@tresorit.com Reach me personally: mihaly.lengyel@tresorit.com