Newer
Older
# Unified data policy
## Replication policies
- Level 4: at least 4 copies, in 3 location, 2 countries, 2 continents.
- Level 3: at least 3 copies, in 2 location, 2 countries.
- Level 2: at least 2 copies.
- Level 1: at least 1 copies.
## Confidential Policies
> `sensitive` means I don't want to leak it, `important` means I don't want to lost it.
- type I2: non-sensitive important data, such as environent setup script, software installation packs, saved movies.
- type I: public personal data, or non-important public data.
- type C2: sensitive important personal data, such as photos, game save; Encrypted type M data.
- type C: sensitive non-important personal data, such as system logs, chat logs, screenshots, web history, development environment.
- type M: secret keys/seeds/passwords, banking account/card information.
> **super key doesn't not apply any data policy, only allowed to store in-brain.**
|Type|Encryption|Ownership|Replication|Current\_Solution|
|---|---|---|---|---|
|M|Always, by GPG master key or super key|1P|Level 4|nfs/backup/C2_M|
|MX|Always, by cold key and super key|1P|Level 4|nfs/backup/MX|
|C2|Only on untrusted device|1P / 3P|Level 3|nfs/backup/C2_M, RecoDrive, encrypted devices|
|C|Device-level encryption|1P / 3P|Level 1|normal encrypted devices|
|I2|Optional|1P / 3P|Level 2|nfs/backup/I2, RecoGit, RecoDrive|
|I|Optional|1P / 3P|Level 1|normal devices|
All device storing / processing unencrypted sensitive data, must either using Fully-Open-Source-Software, or be disconnected from Internet and destroyed afterward.