Crypto shredding: delete data according to the GDPR

Share your love

Table of Contents

Pressing the delete button does not mean that data is deleted, and anonymization processes also have their pitfalls. Therefore, the third part of our tutorial introduces the rendering of data unusable by encryption, the crypto shredding. This method is simple, efficient and high-performance if you want to delete data permanently and consistently, but it also has its limits and pitfalls.

Crypto Shredding encrypts all personal data before it is persisted. The software generates a separate key for each person whose data is being processed. It encrypts the data every time it is written and decrypts it every time it is read. To destroy the data, it is then sufficient to delete the associated cryptographic key.

In addition, persistent data is automatically pseudonymized; Without additional information – without a key – they cannot be assigned to a specific person. Once the key has been deleted, the data is anonymized and is no longer subject to data protection.

  • Access to all heise + content
  • exclusive tests, advice & backgrounds: independent, critically well-founded
  • Read c’t, iX, MIT Technology Review, Mac & i, Make, c’t photography directly in your browser
  • register once – read on all devices – can be canceled monthly
  • first month free, then monthly from € 9.95
  • Weekly newsletter with personal reading recommendations from the editor-in-chief

Start FREE month

Start your FREE month now

Already subscribed to heise +?

Sign up and read

Register now and read articles right away

More information about heise +

Article Source

Read Also   Thursday: ISS gets new landing stage, tech employees in China have had enough
Share your love