{"id":156,"date":"2019-04-16T12:41:01","date_gmt":"2019-04-16T10:41:01","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/"},"modified":"2020-02-14T10:27:40","modified_gmt":"2020-02-14T09:27:40","slug":"how-using-cryptography-helps-to-reduce-the-attack-surface-on-data","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/","title":{"rendered":"How using cryptography helps to reduce the attack surface on data"},"content":{"rendered":"<p>Hi, I\u2019m <a href=\"https:\/\/twitter.com\/vixentael\" rel=\"noopener noreferrer\" target=\"_blank\">Anastasiia Voitova<\/a> and I gave a talk about cryptography and risk management at <a href=\"https:\/\/milan2018.codemotionworld.com\/conference\/\" rel=\"noopener noreferrer\" target=\"_blank\">Codemotion Milan 2018<\/a>. I am product engineer in cryptographic software company Cossack Labs \u2013 we create developer-friendly software to protect data and to help companies to comply with modern regulations. During my talk, we discussed cryptography in a wide context \u2013 not ciphers and keys, but how proper data encryption can help to make your entire infrastructure more secure.<\/p>\n<h2>The less the system knows about the data it operates, the more secure it is<\/h2>\n<p>So, cryptography is not a magic tool that \u201cmakes things secure\u201d because we have selected the right algorithm and long key, but it\u2019s a method of managing the attack surface for the sensitive data. The attack surface is any place in your code, infrastructure, processes, where the sensitive data can be leaked. Cryptography answers the questions about key management, trust schemes, places where data is encrypted and decrypted \u2013 things that determine the attack surface.<\/p>\n<p>Software engineers who know the attack surface of their system can monitor it for suspicious behaviour. The more well-defined and narrow the attack surface is, the better monitoring and risk prevention could be.<\/p>\n<p>How to narrow the attack surface? Move the data encryption as close to the place where plaintext is created as possible.<\/p>\n<h2>\u201cSeparation of duties\u201d for typical web infrastructures<\/h2>\n<p>Typical public <a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\" rel=\"noopener noreferrer\" target=\"_blank\">web applications face many threats<\/a>: injections, XSS, execution flow attacks, and so on. Sometimes web developers decide to encrypt data in a naive way \u2013 encrypting and decrypting it on the web backend side. (Of course, TLS is on and working).<\/p>\n<p>If the decryption key is stored on the web application side (or even in the database) \u2013 <a href=\"https:\/\/www.alibabacloud.com\/help\/faq-detail\/37505.htm\" rel=\"noopener noreferrer\" target=\"_blank\">it\u2019s kinda easy to steal it<\/a>.<\/p>\n<p>A good idea is to use the \u201cseparation of duties\u201d pattern: allow publicly-facing web backend only to encrypt data and move decryption to the separated trusted module.<\/p>\n<p>Simple symmetric encryption won\u2019t work: we should use the combined scheme (symmetric + asymmetric). One of the existing schemes is to generate encryption keys on the web backend: generate a random symmetric key to encrypt the data. Then generate own temporary key pair, use your own private key and the public key of decryption service to encrypt the data encryption key. The last step is to merge all pieces together in the data structure: encrypted data, encrypted key, the public key of web backend. Send and store this data structure in the database.<\/p>\n<p>In this case, a web backend has no keys to decrypt the data. A special decryption module is responsible for data decryption. When a web client wants to get the data, the decryption module reads encrypted data structures from the database. Then it uses its own private key and public key from the data structure to decrypt random symmetric key and encrypted data and returns the payload to the web client. The decryption proxy is a trusted part of infrastructure: we monitor it and its keystore, log access, protect it by firewall and IDS.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-2474 size-full\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/TtFzasZQ.png\" alt=\"\"><\/p>\n<p>It\u2019s just a short overview of the whole scheme, but if you want to understand details or even try it yourself \u2013 check the open source repository of <a href=\"https:\/\/github.com\/cossacklabs\/acra\" rel=\"noopener noreferrer\" target=\"_blank\">Acra<\/a>.<\/p>\n<p>Such an approach works well in the infrastructure with many micro-services and non-trusted client sides (like web).<\/p>\n<h2>End-to-end encryption and Zero Knowledge architectures<\/h2>\n<p>In some systems we can dive deeper \u2013 into building an end-to-end encryption scheme, so no module inside the infrastructure knows the nature of the sensitive data.<\/p>\n<p>Such a software design approach is known as Zero Knowledge architectures (or No Knowledge architectures). In simple words, everything you do on a Zero Knowledge system is encrypted before it is sent to the server, and the key to the encryption is also never known to the service provider. It\u2019s possible to build Zero Knowledge system for messaging, authentication and even secure documents exchange.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-2474 size-full\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/CofZDK4G.png\" alt=\"\"><\/p>\n<p>The world already knows many e2ee chats (like <a href=\"https:\/\/wire.com\/en\/\" rel=\"noopener noreferrer\" target=\"_blank\">Wire<\/a> or <a href=\"https:\/\/signal.org\/\" rel=\"noopener noreferrer\" target=\"_blank\">Signal<\/a>), authentication protocols (like <a href=\"https:\/\/hackernoon.com\/eli5-zero-knowledge-proof-78a276db9eff\" rel=\"noopener noreferrer\" target=\"_blank\">Zero Knowledge Proof protocol<\/a>) and frameworks (like <a href=\"https:\/\/github.com\/cossacklabs\/hermes-core\" rel=\"noopener noreferrer\" target=\"_blank\">Hermes<\/a> or <a href=\"https:\/\/tresorit.com\/secure-file-sharing\" rel=\"noopener noreferrer\" target=\"_blank\">ZeroKit<\/a>). The attack surface for such systems is quite small: if you use a trusted client side (like mobile apps or HSMs), select strong ciphers and implement key management well, your system is kinda safe.<\/p>\n<h2>Well-implemented cryptography gives you control<\/h2>\n<p>If you ever wondering what properly implemented cryptography gives you and how to define \u201cproperly\u201d for your use-case, the answer is that cryptography gives you the control over the attack surface on your data.<\/p>\n<p>However, except implementing encryption, you also need all those shiny traditional techniques like proper access control, monitoring, <a href=\"https:\/\/www.cossacklabs.com\/blog\/how-to-implement-distributed-tracing.html\" rel=\"noopener noreferrer\" target=\"_blank\">logging<\/a>, rolling out security patches, intrusion detection, firewalls, tunnelling, continuous pen-tests (and <a href=\"https:\/\/www.cossacklabs.com\/blog\/backend-data-security-modern-ideas.html\" rel=\"noopener noreferrer\" target=\"_blank\">so on<\/a>). All these measures, applied in the right places, make cryptography useful in a broader landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hi, I\u2019m Anastasiia Voitova and I gave a talk about cryptography and risk management at Codemotion Milan 2018. I am product engineer in cryptographic software company Cossack Labs \u2013 we create developer-friendly software to protect data and to help companies to comply with modern regulations. During my talk, we discussed cryptography in a wide context&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/\">Read more<\/a><\/p>\n","protected":false},"author":25,"featured_media":157,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4329],"tags":[22,38],"collections":[],"class_list":{"0":"post-156","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity","8":"tag-codemotion-milan","9":"tag-security-manager","10":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How using cryptography helps to reduce the attack surface on data - Codemotion Magazine<\/title>\n<meta name=\"description\" content=\"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How using cryptography helps to reduce the attack surface on data\" \/>\n<meta property=\"og:description\" content=\"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-16T10:41:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-14T09:27:40+00:00\" \/>\n<meta name=\"author\" content=\"Anastasiia Voitova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasiia Voitova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/\"},\"author\":{\"name\":\"Anastasiia Voitova\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/672197fead45b745a7a7a4dbfff84944\"},\"headline\":\"How using cryptography helps to reduce the attack surface on data\",\"datePublished\":\"2019-04-16T10:41:01+00:00\",\"dateModified\":\"2020-02-14T09:27:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/\"},\"wordCount\":800,\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/tFtF3lKE.png\",\"keywords\":[\"Codemotion Milan\",\"Security Manager\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/\",\"name\":\"How using cryptography helps to reduce the attack surface on data - Codemotion Magazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/tFtF3lKE.png\",\"datePublished\":\"2019-04-16T10:41:01+00:00\",\"dateModified\":\"2020-02-14T09:27:40+00:00\",\"description\":\"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/tFtF3lKE.png\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/tFtF3lKE.png\",\"width\":1200,\"height\":598},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/cybersecurity\\\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Manager\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/tag\\\/security-manager\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How using cryptography helps to reduce the attack surface on data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Codemotion.Italy\\\/\",\"https:\\\/\\\/x.com\\\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/672197fead45b745a7a7a4dbfff84944\",\"name\":\"Anastasiia Voitova\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ff80c8bcd8b1af872e846c9f5cc80621c8e3f560882443bc9d52ef05efba8768?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ff80c8bcd8b1af872e846c9f5cc80621c8e3f560882443bc9d52ef05efba8768?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ff80c8bcd8b1af872e846c9f5cc80621c8e3f560882443bc9d52ef05efba8768?s=96&d=mm&r=g\",\"caption\":\"Anastasiia Voitova\"},\"description\":\"Anastasiia is a software engineer with plenty of experience in building mobile applications. Security is her topic of interest since forever, so she joined the forces of Cossack Labs first as open source contributor and mobile consultant, then fully immersing into the world of data security and cryptography. Now Anastasiia is writing multi-platform cryptographic software and maintaining open-source security library Themis, that allows developers to integrate encryption into their apps and infrastructures easily. She is conducting workshops and consulting teams about data protection design.\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/author\\\/anastasiia-voitova\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How using cryptography helps to reduce the attack surface on data - Codemotion Magazine","description":"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/","og_locale":"en_US","og_type":"article","og_title":"How using cryptography helps to reduce the attack surface on data","og_description":"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.","og_url":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2019-04-16T10:41:01+00:00","article_modified_time":"2020-02-14T09:27:40+00:00","author":"Anastasiia Voitova","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Anastasiia Voitova","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/"},"author":{"name":"Anastasiia Voitova","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/672197fead45b745a7a7a4dbfff84944"},"headline":"How using cryptography helps to reduce the attack surface on data","datePublished":"2019-04-16T10:41:01+00:00","dateModified":"2020-02-14T09:27:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/"},"wordCount":800,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png","keywords":["Codemotion Milan","Security Manager"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/","url":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/","name":"How using cryptography helps to reduce the attack surface on data - Codemotion Magazine","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png","datePublished":"2019-04-16T10:41:01+00:00","dateModified":"2020-02-14T09:27:40+00:00","description":"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png","width":1200,"height":598},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/how-using-cryptography-helps-to-reduce-the-attack-surface-on-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Security Manager","item":"https:\/\/www.codemotion.com\/magazine\/tag\/security-manager\/"},{"@type":"ListItem","position":3,"name":"How using cryptography helps to reduce the attack surface on data"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/672197fead45b745a7a7a4dbfff84944","name":"Anastasiia Voitova","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ff80c8bcd8b1af872e846c9f5cc80621c8e3f560882443bc9d52ef05efba8768?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ff80c8bcd8b1af872e846c9f5cc80621c8e3f560882443bc9d52ef05efba8768?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff80c8bcd8b1af872e846c9f5cc80621c8e3f560882443bc9d52ef05efba8768?s=96&d=mm&r=g","caption":"Anastasiia Voitova"},"description":"Anastasiia is a software engineer with plenty of experience in building mobile applications. Security is her topic of interest since forever, so she joined the forces of Cossack Labs first as open source contributor and mobile consultant, then fully immersing into the world of data security and cryptography. Now Anastasiia is writing multi-platform cryptographic software and maintaining open-source security library Themis, that allows developers to integrate encryption into their apps and infrastructures easily. She is conducting workshops and consulting teams about data protection design.","url":"https:\/\/www.codemotion.com\/magazine\/author\/anastasiia-voitova\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-600x400.png","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-600x598.png","author_info":{"display_name":"Anastasiia Voitova","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/anastasiia-voitova\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png",1200,598,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-150x150.png",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-300x150.png",300,150,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-768x383.png",768,383,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-1024x510.png",1024,510,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png",1200,598,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png",1200,598,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE.png",100,50,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-180x128.png",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-896x504.png",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-400x225.png",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-600x400.png",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/04\/tFtF3lKE-600x598.png",600,598,true]},"uagb_author_info":{"display_name":"Anastasiia Voitova","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/anastasiia-voitova\/"},"uagb_comment_info":0,"uagb_excerpt":"Hi, I\u2019m Anastasiia Voitova and I gave a talk about cryptography and risk management at Codemotion Milan 2018. I am product engineer in cryptographic software company Cossack Labs \u2013 we create developer-friendly software to protect data and to help companies to comply with modern regulations. During my talk, we discussed cryptography in a wide context&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=156"}],"version-history":[{"count":2,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/156\/revisions"}],"predecessor-version":[{"id":771,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/156\/revisions\/771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/157"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=156"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}