Skip to main content
We’ve updated our Terms of Service. A new AI Addendum clarifies how Stack Overflow utilizes AI interactions.
replaced http://serverfault.com/ with https://serverfault.com/
Source Link

Don't roll your own crypto. Just don't. You can never be sure it's secure, and the first you will hear of it being broken is when Anonymous posts your company secrets on Pastebin.

Use the tools that already exist (e.g. dm-crypt/LUKS for Linux systems, or BitLocker for Windows systems). They are well understood, and any reasonable security auditor will know what they are and that they work.

If the security auditor insists on this less-than-ideal setup, fire them for incompetenceincompetence.

Don't roll your own crypto. Just don't. You can never be sure it's secure, and the first you will hear of it being broken is when Anonymous posts your company secrets on Pastebin.

Use the tools that already exist (e.g. dm-crypt/LUKS for Linux systems, or BitLocker for Windows systems). They are well understood, and any reasonable security auditor will know what they are and that they work.

If the security auditor insists on this less-than-ideal setup, fire them for incompetence.

Don't roll your own crypto. Just don't. You can never be sure it's secure, and the first you will hear of it being broken is when Anonymous posts your company secrets on Pastebin.

Use the tools that already exist (e.g. dm-crypt/LUKS for Linux systems, or BitLocker for Windows systems). They are well understood, and any reasonable security auditor will know what they are and that they work.

If the security auditor insists on this less-than-ideal setup, fire them for incompetence.

replaced http://security.stackexchange.com/ with https://security.stackexchange.com/
Source Link

Don't roll your own cryptoDon't roll your own crypto. Just don't. You can never be sure it's secure, and the first you will hear of it being broken is when Anonymous posts your company secrets on Pastebin.

Use the tools that already exist (e.g. dm-crypt/LUKS for Linux systems, or BitLocker for Windows systems). They are well understood, and any reasonable security auditor will know what they are and that they work.

If the security auditor insists on this less-than-ideal setup, fire them for incompetence.

Don't roll your own crypto. Just don't. You can never be sure it's secure, and the first you will hear of it being broken is when Anonymous posts your company secrets on Pastebin.

Use the tools that already exist (e.g. dm-crypt/LUKS for Linux systems, or BitLocker for Windows systems). They are well understood, and any reasonable security auditor will know what they are and that they work.

If the security auditor insists on this less-than-ideal setup, fire them for incompetence.

Don't roll your own crypto. Just don't. You can never be sure it's secure, and the first you will hear of it being broken is when Anonymous posts your company secrets on Pastebin.

Use the tools that already exist (e.g. dm-crypt/LUKS for Linux systems, or BitLocker for Windows systems). They are well understood, and any reasonable security auditor will know what they are and that they work.

If the security auditor insists on this less-than-ideal setup, fire them for incompetence.

Source Link
Michael Hampton
  • 253.7k
  • 49
  • 528
  • 999

Don't roll your own crypto. Just don't. You can never be sure it's secure, and the first you will hear of it being broken is when Anonymous posts your company secrets on Pastebin.

Use the tools that already exist (e.g. dm-crypt/LUKS for Linux systems, or BitLocker for Windows systems). They are well understood, and any reasonable security auditor will know what they are and that they work.

If the security auditor insists on this less-than-ideal setup, fire them for incompetence.