Skip to content
Thoughtful, detailed coverage of everything Apple for 34 years
and the TidBITS Content Network for Apple professionals

DRAFT!! Who You Going To Trust? And Verify!


Talk about Dropbox and Sony as lead in, and then the whole issue of where we invest our trust in the first place.

Part of it is about never truly being able to know, even with third-party audits by independent firms of security procedures, whether a company actually does everything right to the current set of standards. And even if they do, a cracker might figure out a previously unknown weakness that allows exploiting even a well-run company’s data storage or software. On top of that, keyloggers and other malware can override even the best company software.

Where to start?

First, evaluate the kind of data you’re handing over or storing elsewhere. This is true when signing up for accounts or storing data in the cloud.

Next, consider whether you need to retain the key or not. Even with Dropbox, you can opt to use software that lets you own the key by layering it. Or you can use SpiderOak or other solutions that give you the key by default.


Subscribe today so you don’t miss any TidBITS articles!

Every week you’ll get tech tips, in-depth reviews, and insightful news analysis for discerning Apple users. For over 33 years, we’ve published professional, member-supported tech journalism that makes you smarter.

Registration confirmation will be emailed to you.

This site is protected by reCAPTCHA. The Google Privacy Policy and Terms of Service apply.