Hacker News new | past | comments | ask | show | jobs | submit login

> The only reasons to turn your hard drives off are to save power, reduce noise, or transport them.

One reason some of my drives get powered down 99+% of the time is that its a way to guard against the whole network getting cryptolockered. i have a weekly backup run by a script that powers up a pair of raid1 usb drives, does and incremental no-delete backup, then unmounts and powers them back down again. Even in a busy week theyre rarely running for more than an hour or two. I'd have to get unlucky enough to not have the powerup script detect being cryptolockered (it checks md5 hashes of a few "canary files") and powering up the bav=ckup drives anyway. I figure that's a worthwhile reason to spin them down weekly...




Wouldn't you be protected against cryptolockers by using snapshots?


No, the only proper way to prevent attacks on the data thereof is to keep a backup that isn't readily accessible. Aka offline, whether that's literally turned off or just airgapped from the rest of the infrastructure.


how will they both encrypt your machines drive, and the NAS backup with snapshots on it, but yet not defeat the air gap? air gapping is not some magical technique that keeps you secure.

if you really want to protect yourself from crypto lock attacks, which seems odd for an individual to be concerned about (nobody extorts individuals for a few hundred dollars to get the keys, they extort businesses for many thousands of dollars) then you need write once media like MDISC or WORM tapes.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: