And it ended up, when I started to put it all together, there was enough there that I just made it the title of our podcast. I want to tell our listeners about this journey because I think people would find it interesting. I thought, you know, I've got to stick this in miscellany. Because I ended up with a solution, with several false starts, that I'm really happy with, I had it on my mind. I've provisionally finished a multi-month quest. But Black Hat and DEF CON always bring us just sometimes weeks of stories to catch up and talk about.
And there's no question that next week's podcast will be, well, it's going to be the second Tuesday of the month, so maybe there'll some news, but we're all kind of getting inured to, okay, update because otherwise the sky will fall. Steve: This is our annual pre-Black Hat and DEF CON episode because those happen starting tomorrow is Black Hat and DEF CON. Steve Gibson: Leo, it's great to be with you again, as always, for our 726th episode. It's time for Security Now!, the show where we cover the latest security news, we teach you a little bit about how this stuff works, we talk a little bit about sci-fi, whatever Steve Gibson's in the mood for because he's the man in charge at Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 726, recorded Tuesday, August 6th, 2019: Steve's File Sync Journey. It's all coming up next on Security Now!. Are they going to get what they want? Steve and I think probably so. We've got lots to talk about, including a rare attraction from Bruce Schneier. Quarter size (16 kbps) mp3 audio file URL: High quality (64 kbps) mp3 audio file URL: Then I want to share my recent experiences and findings about the challenge of synchronizing a working set of files between two locations, and the tools I settled on.
If you want to try it out for yourself, the feature is available as part of the Tresorit app on Android and iOS.Description: This week we look at a widespread false alarm about Facebook's planned subversion of end-to-end encryption, still more municipality ransomware attacks, more anti-encryption saber-rattling among the Five Eyes nations, Microsoft's discovery of Russian-backed IoT compromise for enterprise intrusion, Chrome 76's changes, this week's Black Hat and DEF CON conferences, a bit of miscellany, and closing the loop with our listeners. With Tresorit’s document scanner integrated into its encrypted sync and sharing service, scanned files remain confidential, but accessible from anywhere and on any device” “There are many instances when business plans and strategies are discussed in conference rooms and key information is noted down on paper. On the subject of this feature's introduction, Tresorit CEO and founder, István Lám, had this to say: The main addition here compared to similar services is that the file is also encrypted before being sent to the cloud, to minimize the likelihood of leaks, especially in the case of confidential company documents. The resulting file is not stored on the device, but instead goes straight to the user's Tresorit cloud.
The final and perhaps most important aspect of the document scanning feature relates to where the picture (or scanned document) is saved.
The latter can also be customized with password protection, open limit, and expiration date, much in the same way as the previously announced Tresorit Send service.
For one, it allows you to snap pictures of multiple documents and then merge them into a single PDF document, afterwards giving you the ability to share said document via an encrypted link. While the new capability has some things in common with Lens - like the ability to auto-crop and perform quick edits of the snapped picture - there are other aspects to take into consideration.