Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Encrypt the logs with your public key. Do not keep the private key anywhere near the machines, containing the encrypted logs. Move logs to a remote secure storage (co-located or home-hosted) as soon as Internet connection's available. Assure reasonable amount of electronic and physical security of the storage servers.

Problem solved!



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: