Skip to content
Snippets Groups Projects
unified-data-policy.md 1.8 KiB
Newer Older
Recolic K's avatar
Recolic K committed
# Unified data policy

## Replication policies

- Level 4: at least 4 copies, in 3 location, 2 countries, 2 continents. 

- Level 3: at least 3 copies, in 2 location, 2 countries. 

- Level 2: at least 2 copies. 

- Level 1: at least 1 copies. 

## Confidential Policies

> `sensitive` means I don't want to leak it, `important` means I don't want to lost it. 

Recolic's avatar
Recolic committed
- type I2: non-sensitive important data, such as environent setup script, software installation packs, saved movies, ...
Recolic K's avatar
Recolic K committed

- type I: public personal data, or non-important public data. 

Recolic's avatar
Recolic committed
- type C2: sensitive important personal data, such as photos, development, game save...
Recolic K's avatar
Recolic K committed

Recolic's avatar
Recolic committed
- type C: sensitive non-important personal data, such as system logs, chat logs, screenshots, web history, development environment, ...
Recolic K's avatar
Recolic K committed

- type M: secret keys/seeds/passwords, server userdata... 

- type MX: GPG masterkey itself. 

- [TODO]X

> **super key doesn't not apply any data policy, and FORBIDDEN to save on ANY medium.** 

|Type|Encryption|Ownership|Replication|Current\_Solution|
|---|---|---|---|---|
Recolic's avatar
Recolic committed
|M|Always, by GPG master key or super key|First-party|Level 4|extraDisk/.backup/typeM|
|MX|Always, by cold key and super key|First-party|Level 4|extraDisk/.backup/typeM/gpg-masterkey.tar.gz.gpg|
Recolic's avatar
Recolic committed
|C2|Only if accessed by untrusted device|First-party or Third-party|Level 3|~/extraDisk/.backup, online services|
|C|Always, by device encryption|First-party or Third-party|Level 1|normal encrypted devices|
|I2|Optional|First-party or Third-party|Level 2|nfs/rpc\_downloads|
Recolic K's avatar
Recolic K committed
|I|Optional|First-party or Third-party|Level 1|normal devices|

|Properties|Important|Non-Important|
|---|---|---|
Recolic's avatar
Recolic committed
|Sensitive|MX,M,C2|C|
|Non-sensitive|I2|I|
Recolic K's avatar
Recolic K committed

All device storing / processing unencrypted sensitive data, must either using Fully-Open-Source-Software, or be disconnected from Internet and destroyed afterward.