Nicole was a newly minted executive at a major credit card company. Thomas, her husband, was a busy VP. They were rarely in the same city and hadn’t taken a vacation together in years. One day, Thomas received a pleasant surprise: courtesy of a generous client, he was offered the chance to extend his work trip by a week and enjoy the Swiss Alps, all expenses paid. This was a once-in-a-lifetime opportunity.
Read MoreQuick gpg cheatsheet
Assumption gpg is installed and you can run gpg in your terminal Basic encryption concept gpg is mainly used for encryption. This article will conver that part. The flow is that gpg will encrypt the data for someone (which identified by keys) and only him/her key can decrypt the data. To encrypt, gpg needs public key. How that that someone have the key? Good question. Just create it and he will have a pair of keys.
Read MoreEncryption Using Aws Kms
What is KMS? It stands for Key Management Service. It is used for managing encryption keys. Terms CMK: Customer Master Keys Data Keys: encryption keys that can be used for encrypting data, and it can be generated using CMK The concept is that whenever you want to encrypt the data, you create a Data Key. KMS will not store any data key. There will encryption of data key which you can store it.
Read More