TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Attacks on Encrypted Databases [pdf]

106 pointsby blacksmythealmost 8 years ago

4 comments

thruflo22almost 8 years ago
Any good recommendations for running Postgres transparently as a fully encrypted database (not just on a table by table basis)?<p>Or alternatively is this a problem that&#x27;s better &#x2F; just as viably solved with an encrypted filesystem?
评论 #14570794 未加载
评论 #14570242 未加载
评论 #14570138 未加载
falcolasalmost 8 years ago
A few years back, Google worked through their attempts at encrypt MySQL from end to end; it&#x27;s a damned hard problem when you consider all the bits which would need to be encrypted to protect against someone with access to the OS or hypervisor.<p>I haven&#x27;t heard that they were successful.
评论 #14570583 未加载
评论 #14570886 未加载
评论 #14570418 未加载
benologistalmost 8 years ago
Are there caveats for encrypting Redis databases at rest? The main attack vector I&#x27;m trying to thwart is becoming a pastebin dump.
评论 #14574622 未加载
评论 #14572869 未加载
marvel_boyalmost 8 years ago
Is SqliteCipher (sqlite) also vulnerable to the techniques shown on paper?
评论 #14570148 未加载