Pressing the delete button does not mean that data is deleted, and anonymization processes also have their pitfalls. Therefore, the third part of our tutorial introduces the rendering of data unusable by encryption, the crypto shredding. This method is simple, efficient and high-performance if you want to delete data permanently and consistently, but it also has its limits and pitfalls.
Crypto Shredding encrypts all personal data before it is persisted. The software generates a separate key for each person whose data is being processed. It encrypts the data every time it is written and decrypts it every time it is read. To destroy the data, it is then sufficient to delete the associated cryptographic key.
In addition, persistent data is automatically pseudonymized; Without additional information – without a key – they cannot be assigned to a specific person. Once the key has been deleted, the data is anonymized and is no longer subject to data protection.
- Access to all heise + content
- exclusive tests, advice & backgrounds: independent, critically well-founded
- Read c’t, iX, MIT Technology Review, Mac & i, Make, c’t photography directly in your browser
- register once – read on all devices – can be canceled monthly
- first month free, then monthly from € 9.95
- Weekly newsletter with personal reading recommendations from the editor-in-chief
Start FREE month
Start your FREE month now
Already subscribed to heise +?
Sign up and read
Register now and read articles right away
More information about heise +