If you want to backup your Hudson configuration, why not back it up to a version control system (VCS)?
Stephen Connolly has posted a solution in his blog: Keeping Hudson configuration and data in SVN
If you want to backup your Hudson configuration, why not back it up to a version control system (VCS)?
Stephen Connolly has posted a solution in his blog: Keeping Hudson configuration and data in SVN
RFid Data Table from a BBC exhibition (CC: by-nc-nd)
While people don’t talk about their private life in a public form, they do post it in social networks. They don’t want anyone to have a look at the data on their harddisks but they backup the very same data with online backup services. The line between private and the web is blurring.
Unfortunately, data can’t protect itself, so as soon as you put something online, anyone can see it, copy it, give it to someone else or keep a copy even after you deleted it yourself. The Internet doesn’t forget.
So the obvious solution is that data must become active. It must check who has permission to access it and only reveal its details to people who you have permission. How would that work?
Let’s have a look at ssh. At work, I’m accessing a server and work with an account but I have no idea what the password for that account is. How do I login? With my own credentials. I give a public key to the system administrator and he adds me to the list of people who can login. If he doesn’t want me anymore, he deletes the key from the list and I loose access. He doesn’t know my password and I doesn’t know his.
To achieve the same with data, the data must be encrypted. To decrypt it, users must ask a server for the decrypt key and identify themselves with their public key.
Of course, there are a couple of issues with this approach:
Lastly, we could attach a license to data which disallows to share the decrypted copy with anyone. If anyone did, they could be sued for the license infringement. And let us not forget that most people won’t understand how this all works, so they won’t be able to do it. Plus as long as it works and it comfortable enough to use, they won’t see a reason to do it.
For those who do understand the technology or want to abuse it, no amount of protection will be enough to stop them. This is why we have laws and courts.
Comments?