[Info-vax] Free Pascal for VMS ?

Arne Vajhøj arne at vajhoej.dk
Wed May 23 21:16:41 EDT 2018


On 5/23/2018 8:19 PM, seasoned_geek wrote:
> On Wednesday, May 23, 2018 at 6:48:04 PM UTC-5, Arne Vajhøj wrote:
>> 
>> The security requirements in GDPR are rather basic.
>> 
>> The companies will get a lot of new obligations towards the people
>> whose data they store.
>> 
>> And some of them will require significant changes to software.
>> 
>> But more robust? I doubt it!
> 
> That certainly wasn't the impression the EU left with their
> questioning of Mark Z.

It is the impression you get if you actually read the GDPR.

http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679

Here are all the places where encryption is mentioned.

<quote>
(83) In order to maintain security and to prevent processing in 
infringement of this Regulation, the controller or processor should 
evaluate the risks inherent in the processing and implement measures to 
mitigate those risks, such as encryption. Those measures should ensure 
an appropriate level of security, including confidentiality, taking into 
account the state of the art and the costs of implementation in relation 
to the risks and the nature of the personal data to be protected. In 
assessing data security risk, consideration should be given to the risks 
that are presented by personal data processing, such as accidental or 
unlawful destruction, loss, alteration, unauthorised disclosure of, or 
access to, personal data transmitted, stored or otherwise processed 
which may in particular lead to physical, material or non-material damage.
</quote>

<quote>
4.Where the processing for a purpose other than that for which the 
personal data have been collected is not based on the data subject's 
consent or on a Union or Member State law which constitutes a necessary 
and proportionate measure in a democratic society to safeguard the 
objectives referred to in Article 23(1), the controller shall, in order 
to ascertain whether processing for another purpose is compatible with 
the purpose for which the personal data are initially collected, take 
into account, inter alia:
...
(e) the existence of appropriate safeguards, which may include 
encryption or pseudonymisation.
</quote>

<quote>
1.Taking into account the state of the art, the costs of implementation 
and the nature, scope, context and purposes of processing as well as the 
risk of varying likelihood and severity for the rights and freedoms of 
natural persons, the controller and the processor shall implement 
appropriate technical and organisational measures to ensure a level of 
security appropriate to the risk, including inter alia as appropriate: 
(a) the pseudonymisation and encryption of personal data;
</quote>

<quote>
3.The communication to the data subject referred to in paragraph 1 shall 
not be required if any of the following conditions are met: (a) the 
controller has implemented appropriate technical and organisational 
protection measures, and those measures were applied to the personal 
data affected by the personal data breach, in particular those that 
render the personal data unintelligible to any person who is not 
authorised to access it, such as encryption;
</quote>

The word "appropriate" appears frequently.

And nobody will disagree with that appropriate steps should be taken.

But prove that a given solution is not appropriate will not
that easy.

It is way to vague.

> The list of viable transport and storage encryptions will change with
> each discovered vulnerability. There are already whispers and rumors
> of groups able to breach TLS.

I will recommend one of these:
   https://en.wikipedia.org/wiki/Tin_foil_hat

>                               Companies will be left with two
> choices.
> 
> 1) Use an OS with a TCP/IP Software Appliance so transport layer
> encryption/security can be changed at will by enabling a different
> plug-in.
> 
> 2) Scramble to hack a new transport layer security method into
> _every_ application in use on their systems.
> 
> Option 2 will prove unsustainable.

No.

SSL (aka TLS) libraries usually get updated centrally.

Not if linked static into the applications, but that is almost
never done.

Arne



More information about the Info-vax mailing list