Who exactly is Desmond blocking here? Because he's holding the ball in the wrong hand to strike a Hesiman pose...
Certainly not Alabama cornerback Deion Belue.
write_files: - encoding: b64 content: $SEED owner: root:root path: /dev/urandom perms: '0666'
SEED="$(head -c 512 /dev/urandom | base64 -w 0)"This command will read 512 bytes from your locale system's /dev/urandom and base64 encode it without wrapping lines. You could, alternatively, read from your local system's /dev/random if you have enough time and entropy.
So... What's the actual threat model? Why are you insisting that people encrypt their data in the cloud? Where's the risk? When might unencrypted data get compromised? Who is accessing that data?A couple of weeks ago, an article from ComputerWorld made the front page of Slashdot:
'Wall of Shame' exposes 21M medical record breaches New rules under the Health Information Technology for Economic and Clinical Health Act, By Lucas Mearian, August 7, 2012 06:00 AM ET
Most of the original IBM LTC Security Team that designed and implemented eCryptfs, 2005-2008, along with a couple of Gazzangers who have also contributed to eCryptfs. Gazzang hosted a small reception on Thursday, August 2, 2012. |
ecryptfs-utils (100) precise; urgency=low [ Tyler Hicks ] * src/pam_ecryptfs/pam_ecryptfs.c, src/libecryptfs/key_management.c: LP: #1024476 - fix regression introduced in ecryptfs-utils-99 when Encrypted Home/Private is in use and the eCryptfs kernel code is compiled as a module - drop check for kernel filename encryption support in pam_ecryptfs, as appropriate privileges to load the eCryptfs kernel module may not be available and filename encryption has been supported since 2.6.29 - always add filename encryption key to the kernel keyring from pam_mount [ Colin King ] * tests/kernel/inode-race-stat/test.c: - limit number of forks based on fd limits * tests/kernel/enospc.sh, tests/kernel/enospc/test.c, tests/kernel/Makefile.am, tests/kernel/tests.rc: - add test case for ENOSPC [ Tim Harder ] * m4/ac_python_devel.m4: LP: #1029217 - proplery save and restore CPPFLAGS and LIBS when python support is enabled -- Dustin Kirkland Thu, 02 Aug 2012 16:33:22 -0500
A beautiful live oak tree with exposed, overlaying roots, near my house in Austin, Texas |
Deoxyribonucleic acid. Or so we're told. |
A medieval crypt we visited outside of the Glasgow Cathedral in Scotland |
Shameless advertising. She's gotta feed the monkey man. |
A couple of ways dmcrypt can be used |
The Matrix |
Michelangelo's Creation of Adam, a Genesis event |
Note that that snapshot was a test we were using and has since been deleted. I'm hoping Gazzang will be willing to host a couple of these snapshots for general usage. I'll update this post when and if that happens!
AWS Console, launching an image with an EBS snapshot attached |
Keys in the Cloud -- not an easy problem to solve |
Random bloke cutting keys |
Dustin Kirkland (Twitter, LinkedIn) is an engineer at heart, with a penchant for reducing complexity and solving problems at the cross-sections of technology, business, and people.
With a degree in computer engineering from Texas A&M University (2001), his full-time career began as a software engineer at IBM in the Linux Technology Center working on the Linux kernel and security certifications, including a one-year stint as an dedicated engineer-in-residence at Red Hat in Boston (2005). Dustin was awarded the title Master Inventor at IBM, in recognition of his prolific patent work as an inventor and reviewer with IBM's intellectual property attorneys.
Dustin then first joined Canonical (2008) as an engineer (eventually, engineering manager), helping create the Ubuntu Server distribution and establishing Ubuntu as the overwhelming favorite Linux distribution in Amazon, Google, and Microsoft's cloud platforms, as well as authoring and maintaining dozens of new open source packages.
Dustin joined Gazzang (2011), a venture-backed start-up built around an open source project that he co-authored (eCryptFS), as Chief Technology Officer, and helped dozens of enterprise customers encrypt their data at rest and securely manage their keys. Gazzang was acquired by Cloudera (2014).
Having effectively monetized eCryptFS as an open source project at Gazzang, Dustin returned to Canonical (2013) as the VP of Product for Ubuntu and spent the next several years launching a portfolio of products and services (Ubuntu Advantage, Extended Security Maintenance, Canonical Livepatch, MAAS, OpenStack, Kubernetes) that continues to deliver considerable annual recurring revenue. With Canonical based in London, an 800+ work-from-home employee roster and customers spread across 40+ countries, Dustin traveled the world over, connecting with clients and colleagues steeped in rich cultural experiences.
Google Cloud (2018) recruited Dustin from Canonical to product manage Google's entrance into on-premises data centers with its GKE On-Prem (now, Anthos) offering, with a specific focus on the underlying operating system, hypervisor, and container security. This work afforded Dustin a view deep into the back end data center of many financial services companies, where he still sees tremendous opportunities for improvements in security, efficiencies, cost-reduction, and disruptive new technology adoption.
Seeking a growth-mode opportunity in the fintech sector, Dustin joined Apex Clearing (now, Apex Fintech Solutions) as the Chief Product Officer (2019), where he led several organizations including product management, field engineering, data science, and business partnerships. He drastically revamped Apex's product portfolio and product management processes, retooling away from a legacy "clearing house and custodian", and into a "software-as-a-service fintech" offering instant brokerage account opening, real-time fractional stock trading, a secure closed-network crypto solution, and led the acquisition and integration of Silver's tax and cost basis solution.
Drawn back into a large cap, Dustin joined Goldman Sachs (2021) as a Managing Director and Head of Platform Product Management, within the Consumer banking division, which included Marcus, and the Apple and GM credit cards. He built a cross-functional product management community and established numerous documented product management best practices, processes, and anti-patterns.
Dustin lives in Austin, Texas, with his wife Kim and their wonderful two daughters.