Chapter 5

Privacy Tools

This chapter provides a discussion of the types of additional privacy protection to supplement or replace that offered by your cloud storage provider. Two-factor authentication makes your mobile device a tool to protect the privacy of your cloud data. Tools for encrypting data yourself leave the encryption keys and passwords under your control and view. Privacy and security depend on good passwords so we present tools and advice for strong password creation and management. Securing data in the cloud means little if devices that connect to it lack security, so we discuss tools to protect private data on these devices as well. As alternatives standard, commercial cloud data storage, we propose private and peer-to-peer distributed ...

Get Cloud Storage Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.