From d494ff24c79e0231f358c3209f05d58547acb5c5 Mon Sep 17 00:00:00 2001 From: Zooko O'Whielacronx Date: Sat, 1 Aug 2009 22:05:33 -0700 Subject: [PATCH] docs: about.html: fix English usage noticed by Amber --- docs/about.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/about.html b/docs/about.html index d6fd3300..76592326 100644 --- a/docs/about.html +++ b/docs/about.html @@ -13,7 +13,7 @@

provider-independent security?

Every seller of cloud storage services will tell you that their service is "secure". But what they mean by that is something fundamentally different from what we mean. What they mean by "secure" is that after you've given them the power to read and modify your data, they try really hard not to let this power be misused. This turns out to be difficult! Bugs, misconfigurations, or operator error can accidentally expose your data to another customer or to the public, or can corrupt your data. Criminals routinely gain illicit access to corporate servers. More insidiously, employees of the service provider itself may violate your privacy out of carelessness, avarice, or mere curiousity. The most conscientious of these service providers spend considerable effort and expense trying to mitigate these risks.

-

What we mean by "security" is something different. The service provider never has the ability to read or modify your data in the first place. Never. If you use Tahoe-LAFS, then all of the threats described above are non-issues to you. Not only is it easy and inexpensive for the service provider to maintain the security of your data, but in fact they couldn't violate its security if they tried. This is what we call provider-independent security.

+

What we mean by "security" is something different. The service provider never has the ability to read or modify your data in the first place -- never. If you use Tahoe-LAFS, then all of the threats described above are non-issues to you. Not only is it easy and inexpensive for the service provider to maintain the security of your data, but in fact they couldn't violate its security if they tried. This is what we call provider-independent security.

This guarantee is integrated naturally into the cloud storage framework and doesn't require you to perform a manual pre-encryption step or cumbersome key management. (After all, having to do cumbersome manual operations when storing or accessing your data would nullify one of the primary benefits of using cloud storage in the first place.)

Here's how it works.

-- 2.45.2