It’s time again for our bimonthly meeting. We’ll be meeting at Rudolphs Bar-B-Que again starting at 18:30 (6:30 p.m.).
You’ve encrypted your hard drive, your e-mails, and text communications so your data is safe, right? Maybe not. Resident malware can sit on a system, wait for you to decrypt the data, and exfiltrate it.
Whether you’re a Fortune 500 company or an activist protesting against a tyrannical state, you have a vested interest in defending your data from being handed off to unauthorized parties. Historically, defending against data exfiltration has required a great deal of expertise and resources. But tools designed to do this aimed at the average user are now available.
Little Snitch, for example, is a tool that alerts you to outgoing network connections. Why would you care about outgoing network connections? Because it’s possible that a malicious application is making an outgoing connection to exfiltrate some of your sensitive information. Little Flocker takes things a step further by alerting you when an application attempts to access a file. Again, why would you care about applications accessing files? Isn’t that what applications are supposed to do? Well Microsoft Word accessing sensitive-activist-plan.docx may be expected but when an unknown application that has no business accessing a Word document tries to access that file it’s probably not doing so for any good reasons.