Digital gold: why hackers love Bitcoin | Technology | The Guardian

The WannaCry ransomware attackers demanded payment in the cryptocurrency. But its use in the ‘clean’ economy is growing, too, and could revolutionise how we use money

Fuente: Digital gold: why hackers love Bitcoin | Technology | The Guardian


Leaked NSA Malware Is Helping Hijack Computers Around the World

In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the “Shadow Brokers.” Not even a whole month later, the hypothetical threat that criminals would use the tools against the general public has become real, and tens of thousands of computers worldwide are now crippled by an unknown party demanding ransom.

Fuente: Leaked NSA Malware Is Helping Hijack Computers Around the World


Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador

El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.

Fuente: Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador


El ciberataque de escala mundial y “dimensión nunca antes vista” que afectó a instituciones y empresas de casi 100 países – El Mostrador

Un ciberataque “de dimensión nunca antes vista” logró este viernes bloquear el acceso a los sistemas informáticos de instituciones estatales y empresas de varios países.La policía europea, Europol, indicó que el ciberataque era de una escala “sin precedentes” y advirtió que una “compleja investigación internacional” era necesaria para “identificar a los culpables”.

Fuente: El ciberataque de escala mundial y “dimensión nunca antes vista” que afectó a instituciones y empresas de casi 100 países – El Mostrador


Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal

it’s possible to make sure that your private conversations are actually private. It starts with installing an app known as Signal, and getting your friends to install it too. Then you’ll want to tweak the settings to lock everything down.

Fuente: Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal


Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian

Finally, Yahoo’s possible betrayal of its users is another example of why whistleblowers and leaks to the press are so important. The US government considers this type of surveillance “legal” even though it shocks the conscience of many ordinary Americans and dozens of civil liberties groups have been attempting to have courts rule it illegal for years.

Fuente: Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian


Security Tips Every Signal User Should Know

Although Signal is well-designed, there are extra steps you must take if you want to maximize the security for your most sensitive conversations — the ones that could be misinterpreted by an employer, client, or airport security screener; might be of interest to a snooping government, whether at home or abroad; or could allow a thief or hacker to blackmail you or steal your identity.

Fuente: Security Tips Every Signal User Should Know


‘Crypto Wars’ timeline: A history of the new encryption debate

Encryption is finally mainstream.Government officials and technologists have been debating since the early 1990s whether to limit the strength of encryption to help the law-enforcement and intelligence communities monitor suspects’ communications. But until early 2016, this was a mostly esoteric fight, relegated to academic conferences, security agencies’ C-suites, and the back rooms of Capitol Hill.Everything changed in mid-February, when President Barack Obama’s Justice Department, investigating the terrorists who carried out the San Bernardino, California, shooting, asked a federal judge to force Apple to help the Federal Bureau of Investigation unlock one attacker’s iPhone.What followed was an unexpectedly rancorous and unprecedentedly public fight over how far the government should go to pierce and degrade commercial security technology in its quest to protect Americans from terrorism.

Fuente: ‘Crypto Wars’ timeline: A history of the new encryption debate


With Facebook No Longer a Secret Weapon, Egypt’s Protesters Turn to Signal

Although the police in Cairo sealed off parts of the Egyptian capital where protests scheduled on Facebook were to have taken place on Monday, opposition activists managed to stage brief rallies that resembled flash mobs, calling for an end to military rule and the cancellation of a deal to surrender two islands to Saudi Arabia.The fact that Facebook is now so closely monitored by the security forces prompted one leading activist to offer an online tutorial in how to use a new tool, the encrypted messaging app Signal, to help protesters find each other on the city’s streets, and stay one step ahead of the authorities.

Fuente: With Facebook No Longer a Secret Weapon, Egypt’s Protesters Turn to Signal


Europe’s leap into the quantum computing arms race — FT.com

It is a dizzying gamble and there are billions of euros riding on the outcome. If the wager pays off, Europe will hold its own against mighty China and the US; if not, the entire project will be regarded in hindsight as a breathtakingly indulgent folly. I refer, of course, not to the forthcoming referendum on Britain’s EU membership but to the European Commission’s announcement last week that it would be launching a €1bn plan to explore “quantum technologies”. It is the third of the commission’s Future and Emerging Technologies Flagship projects — visionary megaprojects lasting a decade or more. These are challenges too grand — and bets too risky — for a single nation to square up to on its own.

Fuente: Europe’s leap into the quantum computing arms race — FT.com


Ron Wyden vows to filibuster anti-cryptography bill / Boing Boing

Senators Richard Burr [R-NC] and Dianne Feinstein [D-CA] finally introduced their long-rumored anti-crypto bill, which will ban US companies from making products with working cryptography, mandating that US-made products have some way to decrypt information without the user’s permission.

Fuente: Ron Wyden vows to filibuster anti-cryptography bill / Boing Boing


¿Cómo se verifica que yo soy yo en Internet? Una mirada a los proyectos de identificación electrónica en la región « Digital Rights

A medida que aumenta la penetración de Internet y se incrementan los trámites que el gobierno nos ofrece por este medio, aumenta el problema para definir cuáles son los procesos válidos para la autenticación electrónica de usuarios, su identificación y las firmas electrónicas de documentos que se requieren en los diferentes trámites. Sobre todo porque en el mundo crece la suplantación y el robo de identidad asociados a fraudes.

Fuente: ¿Cómo se verifica que yo soy yo en Internet? Una mirada a los proyectos de identificación electrónica en la región « Digital Rights


La clave de cifrado global de BlackBerry, en manos de la polícia

Problemas para BlackBerry. Mientras Apple lucha en los tribunales -y fuera de ellos- para proteger la privacidad de los usuarios, Vice News desvela, a través de documentos por un caso de asesinato, cómo la Policía Canadiense habría obtenido la clave de cifrado global de BlackBerry, haciendo de la seguridad del sistema… algo prácticamente inservible y al servicio de las fuerzas y cuerpos de seguridad de Canadá. ¿Y lo peor del asunto? según fuentes de Vice, poseen esta clave desde 2010.

Fuente: La clave de cifrado global de BlackBerry, en manos de la polícia


Forget Apple's fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian

The privacy crisis is a disaster of our own making – and now the tech firms who gathered our data are trying to make money out of privacy

Fuente: Forget Apple’s fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian


Obama Wants Nonexistent Middle Ground on Encryption, Warns Against “Fetishizing Our Phones”

Obama’s first extended disquisition on the contentious issue of encryption suggests he’s only been listening to one side.

Fuente: Obama Wants Nonexistent Middle Ground on Encryption, Warns Against “Fetishizing Our Phones”


Snowden: FBI's claim it can't unlock the San Bernardino iPhone is 'bullshit' | Technology | The Guardian

NSA whistleblower rubbishes claims that only Apple can unlock killer’s iPhone 5C, indicating FBI has the means itself

Fuente: Snowden: FBI’s claim it can’t unlock the San Bernardino iPhone is ‘bullshit’ | Technology | The Guardian


NSA Is Mysteriously Absent From FBI-Apple Fight

The Federal Bureau of Investigation insisted that it was helpless. The bureau told a judge in February that Apple has the “exclusive technical means” to try to unlock the contents of San Bernardino shooter Syed Rizwan Farook’s iPhone — and that’s why it should be forced to do so. But notably missing from the FBI’s argument was any mention of whether it had consulted spies and sleuths from the government’s intelligence community — particularly the National Security Agency. The Twitterverse exploded with q

Fuente: NSA Is Mysteriously Absent From FBI-Apple Fight


Apple gains support from tech rivals in FBI case – FT.com

ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Management Life & Arts March 4, 2016 2:25 amApple gains support from tech rivals in FBI caseTim Bradshaw in San Francisco Share Print Clip CommentsFBI and Apple logos©FBI/AppleAmerica’s largest technology companies have joined Apple’s fight against the government over data protection and security, in an unusual display of unity by the Silicon Valley rivals.More than a dozen motions filed on Thursday sided with Apple as it tries to resist a demand to write software that would help the FBI unlock the San Bernardino shooter’s iPhone. Civil liberties groups and IT trade associations lined up alongside dozens of law professors and cryptography experts, after Apple filed its own motion for the judicial order to be withdrawn last week.

Fuente: Apple gains support from tech rivals in FBI case – FT.com


What has the FBI ordered Apple to do and why is it refusing? – FT.com

What has Apple been ordered to do?The US court has told Apple to write a piece of software that lowers an iPhone’s defences, enabling the FBI to use brute force to break in by bombarding the device with many possible passwords until it gets the right answer. The new tool would do three things:

Fuente: What has the FBI ordered Apple to do and why is it refusing? – FT.com


Wanting it badly isn't enough: backdoors and weakened crypto threaten the net / Boing Boing

As you know, Apple just said no to the FBI’s request for a backdoor in the iPhone, bringing more public attention to the already hot discussion on encryption, civil liberties, and whether “those in authority” should have the ability to see private content and communications — what’s referred to as “exceptional access.”

Fuente: Wanting it badly isn’t enough: backdoors and weakened crypto threaten the net / Boing Boing


EFF, ACLU, and Amnesty International voice support for Apple in FBI battle | The Verge

The American Civil Liberties Union (ACLU), Electronic Frontier Foundation (EFF), and Amnesty International have come out in support of Apple, after the company said it would contest a judge’s order to unlock an iPhone used by one of the San Bernardino shooters.

Fuente: EFF, ACLU, and Amnesty International voice support for Apple in FBI battle | The Verge


Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation.  In the interest of clarifying the facts and correcting some misinformation, we’ve pulled together a summary of the issues at hand.

Fuente: Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED


We cannot trust our government, so we must trust the technology | US news | The Guardian

Apple’s battle with the FBI is not about privacy v security, but a conflict created by the US failure to legitimately oversee its security service post Snowden

Fuente: We cannot trust our government, so we must trust the technology | US news | The Guardian


Bill Gates backs FBI in battle with Apple over San Bernardino killer's phone | Technology | The Guardian

US government is asking for a particular case, and Apple should comply, says Microsoft co-founder Gates

Fuente: Bill Gates backs FBI in battle with Apple over San Bernardino killer’s phone | Technology | The Guardian


Hillary Clinton and Bernie Sanders Refuse to Choose Between Apple and the FBI

Both candidates tried to occupy a middle ground that doesn’t really exist – either in the war between Apple and the FBI, or when it comes to the spread of unbreakable encryption.

Fuente: Hillary Clinton and Bernie Sanders Refuse to Choose Between Apple and the FBI


FBI Says Apple Court Order Is Narrow, But Other Law Enforcers Hungry to Exploit It

The Justice Department says Apple can destroy the hacking software it makes after it’s used once. But other law enforcers are already lining up to use it themselves.

Fuente: FBI Says Apple Court Order Is Narrow, But Other Law Enforcers Hungry to Exploit It


Apple's Tim Cook defends encryption. When will other tech CEOs do so? | Trevor Timm | Opinion | The Guardian

More high-profile titans need to use their platforms to make crystal clear how important encryption is to users everywhere

Fuente: Apple’s Tim Cook defends encryption. When will other tech CEOs do so? | Trevor Timm | Opinion | The Guardian


Apple believes bill creates ‘key under doormat for bad guys’ – FT.com

Shortly after Theresa May introduced the draft Investigatory Powers bill in November to update the UK’s surveillance laws for the internet age, the home secretary met privately with Tim Cook, Apple’s chief executive. He laid out a number of

Fuente: Apple believes bill creates ‘key under doormat for bad guys’ – FT.com


The hype over metadata is a dangerous myth – FT.com

Communications data — and the government’s powers to collect them — are at the heart of the draft Investigatory Powers Bill introduced by Theresa May, UK home secretary, which is currently under scrutiny. Such metadata are the digital exhaust of our

Fuente: The hype over metadata is a dangerous myth – FT.com


Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model”

The FBI director essentially wants tech companies to roll back secure encryption to something less secure that law enforcement can intercept.

Fuente: Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model”


Hacker-fighting prowess on show at cyber security conference – FT.com

Hacker-fighting prowess on show at cyber security conference – FT.com.

A man types on a laptop computer in an arranged photograph taken in Tiskilwa, Illinois, U.S., on Thursday, Jan. 8, 2015. U.S. officials are discussing whether new standards should be set for government action in response to hacks like the one suffered by Sony Pictures Entertainment, such as if a certain level of monetary damage is caused or if values such as free speech are trampled, National Security Agency Director Michael Rogers said in an interview with Bloomberg News. Photographer: Daniel Acker/Bloomberg©Bloomberg

When cyber security start-ups set out their stalls at the industry‘s largest annual conference on Monday, they will be looking to show off their hacker-fighting prowess not just to buyers of security products, but also to Wall Street investors.

A new generation of cyber security companies is preparing to go public, as analysts predict a rise in security spending by boards desperate to protect themselves from becoming the next Sony Pictures, Home Depot or Target.

Dan Ives, an analyst at FBR Capital Markets, says investors will be flocking to the RSA Conference in San Francisco this week because cyber security is a $15bn-$20bn market opportunity in the next three years.

“Seven or eight years ago you could hear a pin drop at RSA,” he said. “Now it is going to be like a Bon Jovi rock concert.”

“It is the seminal event in cyber security: the new year’s eve, the wedding, the bar mitzvah,” he added.

VC funds have been flooding into cyber security, surpassing $1bn for the first time in the first quarter of 2015, according to data from private company research firm PrivCo. VC funding for security software start-ups hit $2.3bn in 2014, up more than a third from the year before. Just four years ago, less than $1bn was raised by cyber security companies for a whole year.

 


Passphrases That You Can Memorize — But That Even the NSA Can't Guess – The Intercept

Passphrases That You Can Memorize — But That Even the NSA Can’t Guess – The Intercept.

Featured photo - Passphrases That You Can Memorize — But That Even the NSA Can’t Guess

It’s getting easier to secure your digital privacy. iPhones now encrypt agreat deal of personal information; hard drives on Mac and Windows 8.1computers are now automatically locked down; even Facebook, which made a fortune on open sharing, is providing end-to-end encryption in the chat tool WhatsApp. But none of this technology offers as much protection as you may think if you don’t know how to come up with a good passphrase.

A passphrase is like a password, but longer and more secure. In essence, it’s an encryption key that you memorize. Once you start caring more deeply about your privacy and improving your computer security habits, one of the first roadblocks you’ll run into is having to create a passphrase. You can’t secure much without one.

For example, when you encrypt your hard drive, a USB stick, or a document on your computer, the disk encryption is often only as strong as your passphrase. If you use a password database, or the password-saving feature in your web browser, you’ll want to set a strong master passphrase to protect them. If you want to encrypt your email with PGP, you protect your private key with a passphrase. In his first email to Laura Poitras, Edward Snowden wrote, “Please confirm that no one has ever had a copy of your private key and that it uses a strong passphrase. Assume your adversary is capable of one trillion guesses per second.”

In this post, I outline a simple way to come up with easy-to-memorize but very secure passphrases. It’s the latest entry in an ongoing series of stories offering solutions — partial and imperfect but useful solutions — to the many surveillance-related problems we aggressively report about here atThe Intercept.

It turns out, coming up with a good passphrase by just thinking of one is incredibly hard, and if your adversary really is capable of one trillion guesses per second, you’ll probably do a bad job of it. If you use an entirely random sequence of characters it might be very secure, but it’s also agonizing to memorize (and honestly, a waste of brain power).

But luckily this usability/security trade-off doesn’t have to exist. There is a method for generating passphrases that are both impossible for even the most powerful attackers to guess, yet very possible for humans to memorize. The method is called Diceware, and it’s based on some simple math.


Proyecto Tor: cómo es la comunidad alrededor de la red que resiste a la NSA

Proyecto Tor: cómo es la comunidad alrededor de la red que resiste a la NSA.


En la Deep Web no hay sólo delitos, también existe la mayor red de seguridad y privacidad que navega sobre internet y permite que activistas, periodistas, empresas y hasta fuerzas de seguridad compartan trabajen de forma segura

Hablamos con Nick Mathewson, uno de sus fundadores y otros miembros de la organización para entender cómo funciona una comunidad que trabaja para proteger la libertad de expresión y la privacidad de personas en todo el mundo

Cómo se financian, cómo trabajan con fuerzas de seguridad y las dudas sobre su vulnerabilidad después del ataque en enero del año pasado

¿Qué fue primero en la Deep Web: la oscura leyenda del anonimato y los mercaderes sórdidos de Silk Road o la comunidad de hackers y activistas que luchan por los derechos de la sociedad civil en lo que quizás ya sea el único reducto no controlado por la NSA? De lo primero se ha hablado ya demasiado en los medios de forma bastante desinformada, como si uno escribiese sobre un barrio sólo cuando hay un asesinato en una de sus calles. De lo que no se habla tanto -quizás  porque la mayoría de periodistas y medios tradicionales en España no lo usan aún- es de la red Tor y la comunidad que trabaja alrededor de ellos en lo que se denomina Proyecto Tor.
Alrededor de 60 miembros de Tor aprovecharon elCircumvention Tech Festival en Valencia para verse las caras. Hablamos con ellos para saber más sobre las personas detrás de la red segura que la misma NSA definió como “ el rey de la seguridad del anonimato en internet, sin sucesores al trono“.

How have journalists responded to revelations of mass surveillance? | Technology | The Guardian

How have journalists responded to revelations of mass surveillance? | Technology | The Guardian.

Two thirds of investigative journalists think they're being spied on, and many are taking action to combat that.

 Two thirds of investigative journalists think they’re being spied on, and many are taking action to combat that. Photograph: PAWEL KOPCZYNSKI/REUTERS

NSA whistleblower Edward Snowden’s revelations of mass surveillance by government agencies has made a big impact on investigative journalists, according to a new study.

The survey of 671 journalists, conducted by the US-based Pew Research Center and Columbia University’s Tow Center for Digital Journalism, found that 64% believe that the US government has probably collected data about their communications.

49% said that they have changed the way they store and share potentially sensitive documents in the last year as a result, while 29% have altered the way they communicate with fellow journalists.

However, only 3% have opted not to pursue a particular story due to concerns about electronic surveillance and hacking, although 13% have not reached out to a particular source for those reasons. Just 2% have considered abandoning investigative journalism.


PGP creator Phil Zimmermann: 'Intelligence agencies have never had it so good' | Technology | The Guardian

PGP creator Phil Zimmermann: ‘Intelligence agencies have never had it so good’ | Technology | The Guardian.

Phil Zimmermann: 'End-to-end encryption is everywhere now: in browsers, online banking...'

 Phil Zimmermann: ‘End-to-end encryption is everywhere now: in browsers, online banking…’

The recent hack against Sony Pictures is likely to have made companies of all sizes consider upping their cybersecurity measures. Perhaps, though, it’s also a different kind of wake-up call: a reason to think less about security, and more about privacy.

That’s the belief of Phil Zimmermann – the creator of email encryption software Pretty Good Privacy (PGP), and now president and co-founder of secure communications company Silent Circle – initially expressed in a blog post, and expanded on in an interview with the Guardian.

“Sony had all kinds of things: intrusion detection, firewalls, antivirus … But they got hacked anyway. The security measures that enterprises do frequently get breached. People break in anyway: they overcome them,” says Zimmermann.

“A lot of this stuff could have been encrypted. If those emails had been encrypted with PGP or GnuPG, the hackers wouldn’t have gotten very far. Those movie scripts that they stole? They could have been encrypted too.”

Zimmermann hopes that companies will look at what happened to Sony, and use it as a spur to explore encryption as a way to protect their employees’ privacy, rather than ramping up their spending on security measures to protect their data.

“People don’t think of privacy much when they think about enterprises, but enterprise privacy is a real thing: it’s the collective privacy of everybody in the company, and the privacy of the company assets as well,” he says.

“In Sony’s case, there were emails about Hollywood actresses that got breached. That’s connected with personal privacy. I think companies retain too much information.”

If more businesses shift their thinking from security to privacy, it’ll be good news for Silent Circle, which offers technology for encrypted voice calls, video chat and messaging, as well as being a key part of the privacy-focused Blackphonesmartphone.


¿Reemplazar Gmail y Dropbox por una alternativa segura? Nadim Kobeissi (@kaepora) muestra que es posible | Manzana Mecánica

¿Reemplazar Gmail y Dropbox por una alternativa segura? Nadim Kobeissi (@kaepora) muestra que es posible | Manzana Mecánica.

Peerio es un innovador sistema de mensajería y almacenamiento con énfasis en ser fácil de usar, permitir comunicaciones seguras y la posibilidad de compartir grandes archivos. Utiliza encriptación punto-a-punto, lo que significa que la gente que opera Peerio intencionalmente excluye la posibilidad de tener acceso a tus mensajes o tus archivos.

Para registrarse en Peerio, hay que descargar alguno de los programas disponibles: hay versiones para Google Chrome (multi-platforma), Windows y Mac, y versiones para Android e iOS están en desarrollo. Es necesario descargar el programa porque la encriptación ocurre localmente, algo que no es posible hacer de forma completamente segura cuando uno utiliza un sitio web, a menos que uno confíe ciegamente en los desarrolladores de tal sitio (que en general no es buena idea).


Encriptación punto-a-punto: de la oscuridad al mainstream | Manzana Mecánica

Encriptación punto-a-punto: de la oscuridad al mainstream | Manzana Mecánica.

Lunes 5 Ene 2015

Carlos Castillo

En pocos días he llegado a un punto de saturación respecto a leer predicciones para el 2015. Muchas de las predicciones son, fundamentalmente, cosas que ya están sucediendo y que al autor de la predicción le gustaría que continuaran sucediendo. Eso no tiene nada de malo, pero no estaría mal llamar a las cosas por su nombre.

En ese espíritu, creo que hay algo muy importante que sucedió a fines del 2014 y que estaría muy bien que continuara sucediendo el 2015. Me refiero a la transición que están experimentando las tecnologías de nube con conocimiento cero, en particular la encriptación punto-a-punto.

Conocimiento cero = bueno

Almacenar cosas en la “nube” es valioso por varios motivos. Primero, poder acceder a tus propios archivos desde cualquier dispositivo (móvil, tabletlaptop, etc.) es muy conveniente. Segundo, un efecto secundario positivo es que tienes un respaldo de estos archivos. Tercero, es más fácil compartir un archivo con otra persona si tu archivo ya está en la “nube”.

Para muchas personas, resulta obvio que si, por ejemplo, subes algunas fotos a un sistema de almacenamiento, entonces tus fotos quedan a disposición de la gente que opera esa nube. La gente que trabaja para esa empresa puede ver tus fotos, y si los hackean a ellos, o si adivinan tu clave sin necesidad de tener acceso a tu dispositivo, entonces tus fotos pueden acabar en cientos de sitios en Internet.

Para un cliente corporativo, el problema de almacenar secretos de negocio en la nube es mucho más serio, sobre todo si se trata de un negocio del sector tecnológico (posible competidor del proveedor de nube) o que compite con alguna empresa estadounidense, como le sucedió a Petrobras.

Un proveedor de almacenamiento remoto no necesita tener acceso al contenido de tus archivos para poder almacenarlos.

Resulta obvio para casi todo el mundo que esta desventaja es una consecuencia inevitable de subir un archivo a Internet, pero no tiene por qué ser así. Desde hace décadas que existe tecnología para encriptar un archivo antes de subirlo, y decriptarlo después de bajarlo. En otras palabras, para que, sin necesidad de que tú tengas que hace nada ni siquiera preocuparte de lo que está sucediendo, un sistema de almacenamiento pueda funcionar con conocimiento cero.

En algunos casos, el proveedor de almacenamiento ofrece esta característica como una de sus cualidades principales, como es el caso de SpiderOak. En otros casos (e.g. Dropbox), es el mismo usuario el que debe configurar su computador para que utilice cero-conocimiento, como explicamos en un artículo anterior.