Skip to content

Protecting Your Work

Methods and techniques for protecting either sensitive or proprietary data.


Safely Sharing Work

Check your cloud sharing service's documentation on exactly how things work. Most if not all of these options are available through the major cloud providors for 'pro' or 'business' users.

  • Test the link
    • Be sure the correct files and folders are available
    • Check for any sensitive or confidential documents
  • Send the link securely
    • Send links via slack, signal, iMessage, or email
    • Avoid texting links that are not password or email registration protected
      • Text messages are unencrypted / insecure
  • Require email to view
    • If search engines index the link, the public will be required to provide an email to view it
  • Password protect link
    • If search engines index the link, the public still cannot view it
  • Set link expiry
    • Expiring links after 1 month or less is a good standard to follow
  • Hyperlink auditing
    • Capture the IP address, client device, and time your links were opened (platform specific)
  • Set appropriate read / write / access permissions
    • Collaborators should be able to read and or write
    • Only admins or optionally specific collaborators can share or invite other collaborators
    • Sending links intended for review should be set to view or read-only

If you do not have a 'pro' or 'business' account at a cloud provider with these features available, you can encrypt the data locally before sending it via an insecure method and provide the recipient with a public key or an out-of-band passphrase to unlock the file or archive.

Watermarking

TO DO

Generate Unique Watermarks

This technique can apply to both protected or internal work, as well as sensitive forms and documents.

When sending government ID's or forms to a business, watermark them with:

"For [insert business name]'s Use Only"

When work needs to be sent to different departments internally, you can and likely will have to watermark them for internal use only.


Encryption

Sometimes you may be required to encrypt documents or files before sending them. Here are multiple ways to do this.

Encryption Standards:

  • AES 128 (minimum)
  • AES 256 (recommended)

Encryption Types:

  • Symmetric
    • There is one key to encrypt / decrypt the contents
  • Asymmetric
    • There are two keys to encrypt / decrypt the contents
    • Public Key: can be shared publicly, others may use this key to encrypt content to send to you, that only your private key can decrypt
    • Private Key: must stay private, used to decrypt or authenticate content sent to you

Another way to look at asymmetric / public key cryptography:

  • Think of a key to a mailbox
  • Break that key in half
  • One half is the private key that you keep and no one else has knowledge of
  • One half is the public key, which can be copied and given to anyone who wants to communicate or authenticate with your mailbox
  • Alice can encrypt a letter to Bob, using Bob's public key, with her private key
  • Bob can then decrypt the letter using his private key, because the letter was encrypted to him using his public key
  • No one else can decrypt the letter without Bob's private key

Shoutout to Paul Asadoorian for this analogy.


Application Encryption

  • Adobe products have builtin 128-bit password protected (symmetric) encryption for most of their software.
  • Other applications may have a similar feature

Archive Encryption

Compressed archives usually offer a way to AES-256 encrypt the contents.

  • 7-Zip will be the most straight forward GUI option, mainly for Windows
  • Most Linux archive managers have built in encryption options

Command Line Tools

This will always be the easiest and most universal, but is unforunately the least straight forward if you're unfamiliar with the command line


OpenSSL

https://www.openssl.org/

OpenSSL is available by default on macOS and Linux. You can install it on Windows.

This will encrypt and decrypt the file 'file.txt', you provide the password on the command line. Generate / save it from your password manager.

# create a sample file to work with which we'll try to read at the end
echo 'if you can read this, decryption worked!' > file.txt

# encrypt
openssl aes256 -e -in file.txt -out file.txt.aes256 -pbkdf2
enter aes-256-cbc encryption password:
Verifying - enter aes-256-cbc encryption password:

# check cwd
ls
doc.txt  doc.txt.aes256

# decrypt
openssl aes256 -d -in doc.txt.aes256 -out doc.txt -pbkdf2
enter aes-256-cbc decryption password:

# make sure we can read the text file
cat file.txt
if you can read this, decryption worked!

gpg

https://www.gnupg.org/

GnuPG is available by default on Linux and can be installed on macOS with brew

# encrypt, you'll be prompted for password
gpg --no-symkey-cache --symmetric --cipher-algo AES256 file.txt 

# check cwd
ls
file.txt  file.txt.gpg

# decrypt, provide password at prompt
gpg --no-symkey-cache -d file.txt.gpg 

gpg: AES256 encrypted data
gpg: encrypted with 1 passphrase
if you can read this, decryption worked!