— Your Host:
James Beecham
with:
—
James Beecham
I mentioned ALTR's implementation of their cybersecurity solution into Snowflake here: https://www.alwaysinvert.com/article/the-no-code-revolution
ALTR's co-founder and CTO James Beecham is always a great source for cybersecurity insights.
Tokens have no mathematical relationship to the original data, which means unlike encrypted data, they can’t be broken or returned to their original form. While many of us might think encryption is one of the strongest ways to protect stored data, it has a few weaknesses, including this big one: the encrypted information is simply a version of the original plain text data, scrambled by math. If a hacker gets their hands on a set of encrypted data and the key, they essentially have the source data.
Tokens have no mathematical relationship to the original data, which means unlike encrypted data, they can’t be broken or returned to their original form. While many of us might think encryption is one of the strongest ways to protect stored data, it has a few weaknesses, including this big one: the encrypted information is simply a version of the original plain text data, scrambled by math. If a hacker gets their hands on a set of encrypted data and the key, they essentially have the source data.