26th June, 2018 | Decentralize to Protect your Data
By continuing to use this site, you agree to our updated Privacy Policy and Terms of Use. ×





Decentralize to Protect your Data

26th June, 2018 | Data Security | Entropic

While most of us rely on encryption and authentication to protect our most critical files and other information, the reality is that these approaches to securing information have shown a continual pattern of failure since their inception. Compounding this issue is that over the past 20 years, we have carried forth an endemic fortress-based mindset of protecting information into the digital world, by consolidating massive amounts of sensitive information in select physical locations using cloud-based infrastructure. This approach has dangerously centralized and even duplicated masses of stored information, in the name of manageability and cost savings.

Málaga, Spain: Photo by JR Korpa on Unsplash

By prioritizing manageability and cost-savings over security, we have unwittingly created high value targets for cybercriminals, and further increased the motivation and ease at which they can extract large amounts of information for sale, distribution and exploitation.

Historical Traits of Centralizing Information

We can summarize the historical traits of centralizing information as follows:

  1. Collect Massive Amounts of Information, and Put it All in One Place

  2. Ensure this Place is Physically Connected to the Internet

  3. Duplicate it to Other Places, in Case it is Lost or Damaged

  4. Assume that Hardware, Software and People can Protect this Place

  5. Assume that any Compromise of this Wealth of Information Can be Managed

  6. Ignore/Defer Concerns about the Consequences of a Compromise

In this article, we'll discuss a decentralized approach to information protection that can immunize your files and information from theft, loss and disclosure over time, while still allowing you to continue to use your preferred storage habits.

Panwrypter

Panwrypter is an App that is designed from the ground up specifically for decentralizing the storage of sensitive documents and files, protecting them from unauthorized access over time, including data breaches, cyber-theft, unauthorized physical access, or simply losing or forgetting about the existence of your files.

Panwrypter file protection works by rearranging the fabric of your documents and files into non-linear protected volumes. Each of these volumes is then stored at a series of different places - your storage sites. Should any of your storage sites be compromised over time, your original files cannot be recovered by the attacker, since none of the protected volumes has enough information to reconstruct the fabric of your original protected files.

Decentralizing File Security using Panwrypter

When you need to gain access to your original files at a later time, simply use Panwrypter to collect back your protected volumes from their storage sites, and restore your original files.

A key security principle behind Panwrypter is not only the distribution of the non-linear fabric of your documents and files across different locations. Panwrypter is also designed specifically to avoid "knowing" about your storage sites - where you store your protected volumes.

This means it does not digitally store any information about the location of your storage sites, including on any type of service, directory or data file. Using this approach means that an attacker that is able to compromise your notebook or PC can never find out where your storage sites are - further enhancing the security of your protected files.

Selecting Files and Folders to Protect in Panwrypter

Being designed specifically for decentralized protection, Panwrypter is loaded with options that can help provide you with the best possible protection, while regarding your existing storage habits.

Specifically, it can help you to define a decentralized approach to protecting your documents & files, based on your lifestyle, while helping you to continue to use your existing storage media and services - the ones that you are already comfortable with.

Selecting Allowed Restore Locations in Panwrypter

In addition, Panwrypter can help you apply data recovery techniques in the event that one or more of your protected volumes is damaged, control where your files can be physically restored from, and help you to safely remember the details of your storage sites when you need to access your files at a later time.

Learn more about Panwrypter, or download it from the Mac App Store.


There is a series of evolving alternative technologies that are helping to decentralize stored information, with many making use of blockchain. A great overview of the concepts, concerns, and advantages of blockchain-based storage is discussed in this article by Delton Rhodes, originally posted on CoinCentral.com.

If you have any feedback, questions, or suggestions, please let us know.

Acknowledgements:
Málaga, Spain: Photo by JR Korpa; Fortress in Alhambra, Granada, Spain: Photo by Willian Justen de Vasconcellos; Bourscheid Castle, Luxembourg: Photo by Marc Marchal...on Unsplash.


Copyright © 2018, Entropic LLC Privacy Policy, Terms of Use