paint-brush
Bypassing Enterprise Data Encryption Policy with Metadata [A How-To Guide]by@john-moon
389 reads
389 reads

Bypassing Enterprise Data Encryption Policy with Metadata [A How-To Guide]

by John Moon3mOctober 31st, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Metamorpher converts arbitrary data into metadata. The tool turns an input file into a directory structure of empty files whose filenames contain a Base64 encoded representation of the input file. It will "encrypt" the files, but if it doesn't touch the filename, the data is stored in the clear. An insider could easily encode a large archive of sensitive data into filenamed files on disk and send the contents to a rival company or a rival nation. This method is a balance between user convenience and security.

Company Mentioned

Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Bypassing Enterprise Data Encryption Policy with Metadata [A How-To Guide]
John Moon HackerNoon profile picture
John Moon

John Moon

@john-moon

Embedded Developer in Folsom, CA

About @john-moon
LEARN MORE ABOUT @JOHN-MOON'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

John Moon HackerNoon profile picture
John Moon@john-moon
Embedded Developer in Folsom, CA

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite