

Or put differently, we could not possibly comply with a subpoena for your data because we cannot decrypt it, period. If you never prepare a restore (or up until you prepare your first restore), your files are unable to be read by malicious hackers that have compromised our systems (if that ever occurs), because you have literally never given us the passphrase. If you set a private passphrase, then we are keeping your private encryption key for you encrypted with the passphrase on our servers. > A solution would be then to story copy of the key encrypted on their servers But 60 seconds of slightly decreased security on one computer in our datacenter is better than leaving your files laying around in original unencrypted form in our data center for YEARS. Then after that window if at any point AFTER that our systems are compromised then you are totally safe because the hacker cannot roll back time and gain access to the past.

Then we delete the plain text version of your files (all completely automated on a secure computer in our datacenter) and we purge the passphrase from RAM.
BACKBLAZE CUSTOMER SERVICE ADDRESS DOWNLOAD
Yes, at this moment there is a short window (maybe 60 seconds long) of decreased security until your backup is prepared and when you download it. At this point you hand us the private passphrase (which we do NOT write to a disk, it is stored in RAM only). Ok, so then after two years let's say you need one of your files back. If a hacker penetrates our systems at any time during that two years, your backup is completely impossible to read, because you literally have never supplied the private pass phrase. Let's say you don't need a restore for two years. So from time to time when SSL/HTTPS has zero day vulnerabilities, the extra layer of encryption helps.Ģ) If you set a private passphrase, it is literally a zero knowledge system until the first time you ever request a restore.

When OpenSSL had the Heartbleed bug, the HTTPS was not enough, and our encryption kept us safer for the few days until we had everything patched and fixed. Here are some examples of where I think it has been useful to us (and our customers):ġ) Backblaze encrypts the data with pub/priv keys and then sends the completely encrypted data over HTTPS. It doesn't provide an additional layer of security to use asymmetric crypto the way they are using it.
