<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: What techniques do you use to protect information?</title>
	<atom:link href="http://www.embeddedinsights.com/channels/2011/06/16/what-techniques-do-you-use-to-protect-information/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.embeddedinsights.com/channels/2011/06/16/what-techniques-do-you-use-to-protect-information/</link>
	<description>Shedding Light on the Hidden World of Embedded Systems</description>
	<lastBuildDate>Mon, 28 Jul 2014 16:18:37 -0400</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0</generator>
	<item>
		<title>By: L.R. @ LI</title>
		<link>http://www.embeddedinsights.com/channels/2011/06/16/what-techniques-do-you-use-to-protect-information/#comment-6792</link>
		<dc:creator>L.R. @ LI</dc:creator>
		<pubDate>Thu, 16 Jun 2011 21:04:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.embeddedinsights.com/channels/?p=564#comment-6792</guid>
		<description>I am sorry to disappoint you, but the most widely used secure token vendor RSA (subsidiary of EMC) has been recently hacked, and all of the tokens it sold, hard and soft, are now considered to have been compromised.

http://arstechnica.com/security/news/2011/06/rsa-finally-comes-clean-securid-is-compromised.ars</description>
		<content:encoded><![CDATA[<p>I am sorry to disappoint you, but the most widely used secure token vendor RSA (subsidiary of EMC) has been recently hacked, and all of the tokens it sold, hard and soft, are now considered to have been compromised.</p>
<p><a href="http://arstechnica.com/security/news/2011/06/rsa-finally-comes-clean-securid-is-compromised.ars" rel="nofollow">http://arstechnica.com/security/news/2011/06/rsa-finally-comes-clean-securid-is-compromised.ars</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Bharath</title>
		<link>http://www.embeddedinsights.com/channels/2011/06/16/what-techniques-do-you-use-to-protect-information/#comment-6789</link>
		<dc:creator>Bharath</dc:creator>
		<pubDate>Thu, 16 Jun 2011 19:48:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.embeddedinsights.com/channels/?p=564#comment-6789</guid>
		<description>A few things I do at a personal level are -

* I use and recommend truecrypt to encrypt entire partitions with secure data. However, this also involves passwords. This is only used when it is okay to loose data, but not okay to have it compromised.

* Any where I write important numbers (CVV / SSN / CreditCards), I obfuscate it by writing several similar numbers with similar patterns and use simple ceasar cypher on it that I can decrypt in my mind.

* I have scratched off the CVV numbers from my credit cards.

* Use virtual credit cards when purchasing from HK, chinese vendors. Unfortunately AmEx does not offer this anymore :-(</description>
		<content:encoded><![CDATA[<p>A few things I do at a personal level are -</p>
<p>* I use and recommend truecrypt to encrypt entire partitions with secure data. However, this also involves passwords. This is only used when it is okay to loose data, but not okay to have it compromised.</p>
<p>* Any where I write important numbers (CVV / SSN / CreditCards), I obfuscate it by writing several similar numbers with similar patterns and use simple ceasar cypher on it that I can decrypt in my mind.</p>
<p>* I have scratched off the CVV numbers from my credit cards.</p>
<p>* Use virtual credit cards when purchasing from HK, chinese vendors. Unfortunately AmEx does not offer this anymore <img src='http://www.embeddedinsights.com/channels/wp-includes/images/smilies/icon_sad.gif' alt=':-(' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
</channel>
</rss>
