What is secure local storage?
Local Storage offers isolation per the Same Origin Policy, meaning that one origin cannot access the Local Storage of another Origin. Data stored there is saved across browser sessions, so if a user closes the browser tab or window, the data will still be available in the Local Storage when the user revisits the page.
To secure local storage, one approach is to encrypt the data before storing it. This can be achieved using various encryption algorithms such as AES, RSA, etc. Another approach is to use a library or a tool that provides secure local storage, such as secure-ls or localForage .
localStorage pros and cons
Another advantage of localStorage is its contents cannot be automatically sent anywhere. Therefore, localStorage is immune to cross-site request forgery (CSRF) attacks. On the downside, localStorage is potentially vulnerable to cross-site scripting (XSS) attacks.
Cookies still have some vulnerabilities but it's preferable compared to localStorage whenever possible. Because: Both localStorage and cookies are vulnerable to XSS attacks, but it's harder for the attacker to do the attack when you're using httpOnly cookies.
Local storage may refer to: Data storage that is directly attached to a compute device. A network-attached storage device accessed via a local network, rather than a wide area network. Local storage, a JavaScript web storage facility allowing websites to store data on a user's device.
Secure Storage
Stored files are encrypted with individual record-level, AES-256 encryption keys generated locally, at the device level. Simply drag and drop files into the Web Vault Or Desktop App. On iOS and Android, you can load content from the local device.
Secure data storage refers to data that is stored in computer or server hard disks, external hard drives, USB drives, cloud, network-based storage area network (SAN), or network-attached storage (NAS).
Secure storage uses a "master" password to encrypt it and store the encrypted Git password in a file on disk. The master password is obtained from a password provider module. The master passwords are obtained in a "lazy" fashion, only when they are about to be used.
Secure storage allows you to protect your valuables by securing them in a safe place. Total Safes offers a range of secure storage such as Security Cabinets, Fireproof Safes, Exam Cabinets, Key Cabinets, Tool Storage and Gun Cabinets.
Use end-to-end encrypted cloud storage
The best way to prevent your files from falling into the wrong hands is to use an end-to-end encrypted cloud storage provider, such as Proton Drive. Files encrypted using end-to-end encryption are always secure.
What is the most secure data storage?
- Sync.com — The best secure cloud storage on the market.
- pCloud — A great all-around cloud storage with optional client-side encryption.
- Icedrive — Zero-knowledge encryption and a gorgeous interface.
- Egnyte — Enterprise-focused cloud storage with top-notch security.
localStorage is a property that allows JavaScript sites and apps to save key-value pairs in a web browser with no expiration date. This means the data stored persists even after the user closes the browser or restarts the computer.
HTML local storage poses security risks due to lack of encryption, vulnerability to XSS attacks, potential Same Origin Policy bypass, and data leakage to scripts on the same domain.
Unlike cookies, local storage data is not sent to the server with every request, which can improve performance and reduce bandwidth usage. Local storage data can also persist across sessions, meaning that it does not expire or get deleted unless the user clears it manually.
LocalStorage has no expiration time, Data in the LocalStorage persist till the user manually delete it. This is the only difference between LocalStorage and SessionStorage.
Local Storage includes physical hardware such as external hard drives, flash drives, and CDs. As its name suggests, local storage is kept nearby.
The difference between sessionStorage and localStorage is that localStorage data does not expire, whereas sessionStorage data is cleared when the page session ends. A unique page session gets created once a document is loaded in a browser tab. Page sessions are valid for only one tab at a time.
- setItem() - takes a key-value pair and adds it to localStorage.
- getItem() - takes a key and returns the corresponding value.
- removeItem() - takes a key and removes the corresponding key-value pair.
- clear() - clears localStorage (for the domain)
The secure storage service provides encrypted and tamper proof storage to secure apps. All operations that modify the file system state are transactional.
Secure Folder has been designed so that its data cannot be easily accessed by anyone, even if they gain access to your phone. Secure Folder is exclusive to Samsung phones—you won't find it on any other Android device.
How do I know if a file is secure?
- Download from a reputable website. Only download files or software from trusted sources and websites. ...
- Check the URL. Suspicious websites mirror legitimate ones to trick you into trusting them. ...
- Trust your browser. ...
- Use an antimalware service.
Secure data storage applies to data at rest stored in computer/server hard disks, portable devices – like external hard drives or USB drives – as well as online/cloud, network-based storage area network (SAN) or network attached storage (NAS) systems.
An effective storage security strategy is essential in preventing unauthorized access to data and underlying storage systems. It is also important in ensuring authorized users have the access they need for their jobs.
Access Control
This can be achieved through the use of passwords, multi-factor authentication, and role-based access control. These methods ensure that only those with the proper authorization can access sensitive data, reducing the risk of data breaches and unauthorized access.
Passwords, as well as the private keys used in certificates, are encrypted using a pre-defined private key when stored on the FortiAnalyzer, and encoded when displayed in the CLI and configuration file.
Ionic Secure Storage is a cross-platform local database system for high performance, secure data storage on iOS and Android. It provides full SQL query and relational data support through SQLite, as well as key/value support for simpler use cases when used with the Ionic Storage utility library.
There are three main categories of storage devices: optical, magnetic and semiconductor. The earliest of these was the magnetic device. Computer systems began with magnetic storage in the form of tapes (yes, just like a cassette or video tape). These graduated to the hard disk drive and then to a floppy disk.
magnetic storage devices, such as hard disk drives. optical storage devices, such as CD, DVD and Blu-ray discs. solid state storage devices, such as solid state drives and USB memory sticks.
Files, blocks, and objects are storage formats that hold, organize, and present data in different ways—each with their own capabilities and limitations.
Secure cloud storage works just like regular cloud storage but is protected with end-to-end encryption (E2EE). E2EE is an advanced security protocol that ensures nobody can open your files without your permission, not even your cloud storage provider.
Is Localstorage a security risk?
HTML local storage poses security risks due to lack of encryption, vulnerability to XSS attacks, potential Same Origin Policy bypass, and data leakage to scripts on the same domain.
Secure Folder has been designed so that its data cannot be easily accessed by anyone, even if they gain access to your phone. Secure Folder is exclusive to Samsung phones—you won't find it on any other Android device.
Your best bet with storing important documents is a safe deposit box. Most banks or credit unions offer safe deposit boxes. Some banks will offer a discount if you're a current customer as well.
- Encryption. Encryption is a fundamental component for protecting personal data. ...
- Backup and Recovery. ...
- Access Control. ...
- Network Security. ...
- Physical Security.
DAS devices include floppy disks, optical discs—compact discs (CDs) and digital video discs (DVDs)—hard disk drives (HDD), flash drives and solid-state drives (SSD).
localStorage is a property that allows JavaScript sites and apps to save key-value pairs in a web browser with no expiration date. This means the data stored persists even after the user closes the browser or restarts the computer.
Benefits of localStorage
Using localStorage offers a number of benefits, including the following: More storage: As noted earlier, localStorage can store up to 5 MB of data in most browsers, much more than what cookies can hold. Developer-friendly API: The API makes it easy to access and add data in localStorage.
1. If a site is vulnerable to XSS, LocalStorage is not safe. Perhaps the biggest objection to the use of local storage is the security vulnerabilities associated with it. Local storage shares many of the same characteristics as a cookie, including the same security risks.
References
- https://recoverit.wondershare.com/harddrive-backup/transfer-files-from-c-drive-to-d-drive-in-windows.html
- https://auth0.com/blog/what-is-data-security/
- https://en.wikipedia.org/wiki/USB_flash_drive_security
- https://www.toppr.com/ask/question/which-of-the-following-is-an-example-of-storage-devices/
- https://netdepot.com/blog/5-tips-for-secure-data-storage-in-2021/
- https://cloudian.com/guides/data-protection/secure-data-storage/
- https://www.studocu.com/en-us/messages/question/2904265/which-of-the-following-is-not-a-benefit-of-cloud-computing-to-organizationsa-on-demand
- https://www.creativebloq.com/advice/how-much-cloud-storage
- https://support.microsoft.com/en-au/office/save-disk-space-with-onedrive-files-on-demand-for-windows-0e6860d3-d9f3-4971-b321-7092438fb38e
- https://byjus.com/free-ias-prep/difference-between-hardware-and-software/
- https://www.techtarget.com/searchstorage/tip/Top-5-cloud-storage-security-issues-and-how-to-contain-them
- https://www.geeksforgeeks.org/difference-between-local-storage-session-storage-and-cookies/
- https://www.getkisi.com/blog/7-tips-prevent-cloud-security-threats
- https://www.redhat.com/en/topics/data-storage/file-block-object-storage
- https://www.outsourceitcorp.com/how-to-tell-if-your-cloud-has-been-hacked/
- https://www.techtarget.com/searchenterprisedesktop/definition/hard-drive-encryption
- https://softwarekeep.com/blog/ssd-vs-hdd-difference
- https://skiff.com/blog/disadvantages-of-cloud-storage
- https://www.mindtools.com/ahjudzv/7-tips-for-effective-file-management
- https://proton.me/blog/cloud-storage-safe
- https://www.aiuniv.edu/blog/2012/july/local-storage-vs-cloud-storage
- https://www.linkedin.com/advice/3/how-can-you-use-html5-local-storage-safely-skills-html5
- https://computertechnicians.com.au/wd-vs-seagate-who-wins-the-battle-in-2022/
- https://www.techopedia.com/never-really-gone-how-to-protect-deleted-data-from-hackers/2/30290
- https://www.techtarget.com/searchstorage/definition/storage-security
- https://www.zdnet.com/article/best-external-hard-drive/
- https://www.integralmemory.com/faq1/how-long-will-data-stay-valid-for-on-a-usb-drive/
- https://www.makeuseof.com/why-local-drives-windows-start-from-c/
- https://snyk.io/blog/is-localstorage-safe-to-use/
- https://www.geeksforgeeks.org/localstorage-and-sessionstorage-web-storage-apis/
- https://www.veritas.com/blogs/why-cloud-storage-security-is-so-important
- https://aws.amazon.com/what-is/cloud-storage/
- https://www.cgdirector.com/difference-between-c-and-d-drive/
- https://www.techcrates.com/windows-files-and-folders-you-should-never-delete-or-modify-2020/
- https://www.hpe.com/in/en/what-is/data-storage.html
- https://serverfault.com/questions/6013/is-it-safe-to-store-data-on-a-hard-drive-for-a-long-time
- https://www.bu.edu/tech/support/information-security/security-for-everyone/how-to-safely-store-your-data-in-the-cloud/
- https://www.godaddy.com/resources/skills/keep-your-files-safe-and-secure-in-the-cloud
- https://www.hp.com/us-en/shop/tech-takes/computer-memory-vs-storage
- https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/top-cloud-security-issues-threats-and-concerns/
- https://www.alphr.com/remove-write-protection-from-sd-card/
- https://www.softwaretestinghelp.com/exfat-vs-ntfs/
- https://www.digitalcitizen.life/command-prompt-how-use-basic-commands/
- https://www.safewise.com/blog/keep-important-documents-safe-home/
- https://www.sdxcentral.com/security/definitions/data-security-in-the-cloud-best-practices/five-security-aspects-of-cloud-computing/
- https://www.raconteur.net/technology/are-cloud-cost-savings-overstated
- https://www.techtarget.com/searchstorage/definition/RAM-random-access-memory
- https://contenteratechspace.com/6-best-ways-for-long-term-data-storage/
- https://www.ibm.com/blog/hard-disk-drive-vs-solid-state-drive/
- https://thehackernews.com/2022/01/hackers-use-cloud-services-to.html
- https://www.promax.com/blog/10-advantages-and-disadvantages-of-cloud-storage
- https://superuser.com/questions/1155965/will-i-lose-my-files-on-drive-d-reinstalling-windows
- https://www.officesolutionsit.com.au/blog/is-cloud-storage-worth-it
- https://www.makeuseof.com/tag/estimate-remaining-lifespan-ssd/
- https://recoverit.wondershare.com/harddrive-errors/solved-d-drive-suddenly-missing-in-windows-10.html
- https://www.colesclassroom.com/lexar-vs-sandisk-which-sd-card-is-better/
- https://www.computerhope.com/issues/ch000799.htm
- https://hypertecsp.com/knowledge-base/data-storage-security/
- https://www.cdw.com/content/cdw/en/articles/datacenter/what-is-data-storage.html
- https://proton.me/blog/cloud-hacked
- https://www.computerhope.com/jargon/s/stordevi.htm
- https://www.salvagedata.com/external-hard-drive-vs-usb-flash-drive/
- https://diskdoctors.com/faq/SSD-128GB-or-1TB-HDD.aspx
- https://www.bbc.co.uk/bitesize/topics/zf2f9j6/articles/ztwnvj6
- https://bysafeonline.com/guide-to-secure-data-storage/
- https://www.geeksforgeeks.org/what-is-a-storage-device-definition-types-examples/
- https://u-next.com/blogs/cloud-computing/top-10-advantages-and-disadvantages-of-cloud-storage/
- https://blog.amnb.com/what-you-should-shouldnt-store-in-the-cloud/
- https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/
- https://www.cloudwards.net/who-has-access-to-your-personal-cloud-storage/
- https://www.shredall.co.uk/blog/how-to-dispose-of-hard-drives
- https://www.microsoft.com/en-us/edge/learning-center/how-to-check-if-a-file-is-safe-to-download
- https://intellipaat.com/blog/what-is-computer-security/
- https://android.googlesource.com/trusty/app/storage/+/refs/heads/master/README.md
- https://www.businessinsider.com/guides/tech/how-to-delete-photos-from-iphone-but-not-icloud
- https://study.com/academy/lesson/external-and-internal-storage-devices-optical-magnetic-semiconductor-storage.html
- https://experience.dropbox.com/get-organized/storage-devices
- https://thesciencebehindit.org/how-secure-is-data-stored-in-the-cloud/
- https://www.geeksforgeeks.org/advantages-and-disadvantages-of-flash-memory/
- https://www.quora.com/Why-does-a-256GB-SSD-have-better-performance-than-a-128GB-SSD
- https://help.eclipse.org/latest/topic/org.eclipse.platform.doc.user/reference/ref-securestorage-works.htm
- https://intlbm.com/2023/01/03/9-types-of-data-that-need-to-be-protected/
- https://www.geeksforgeeks.org/10-advantages-and-disadvantages-of-cloud-storage/
- https://www.diskpart.com/windows-10/how-to-use-d-drive-windows-10-0001.html
- https://home.howstuffworks.com/home-improvement/household-hints-tips/cleaning-organizing/how-to-organize-computer-files.htm
- https://support.apple.com/en-us/HT202303
- https://www.reneelab.com/secure-digital-storage-device.html
- https://m.majorgeeks.com/content/page/c_drive.html
- https://www.asurion.com/connect/tech-tips/how-long-does-computer-hard-drive-last/
- https://iapp.org/news/a/is-your-cloud-data-safe-from-government-searches/
- https://capacity.com/cloud-storage/faqs/does-cloud-storage-have-virus-protection/
- https://testbook.com/question-answer/which-one-of-the-following-is-not-a-storage-device--60895b472845ce3f165c92f6
- https://www.meticulous.ai/blog/localstorage-complete-guide
- https://levelup.gitconnected.com/why-cookie-is-preferable-compared-to-localstorage-when-it-comes-to-authentication-b43ac5610be6
- https://www.aura.com/learn/have-i-been-hacked
- https://www.bbc.co.uk/bitesize/guides/z67j2nb/revision/2
- https://www.core.co.uk/blog/what-happens-when-the-cloud-goes-down
- https://www.pccorp.com/pc-corp-blog/encrypting-hard-drive-to-protect-your-data/
- https://www.easeus.com/resource/use-cmd-remove-virus-windows-10.html
- https://support.google.com/files/answer/9935264?hl=en
- https://www.cloudwards.net/the-risks-and-benefits-of-cloud-storage/
- https://www.techadvisor.com/article/745187/how-safe-is-cloud-storage.html
- https://www.cisco.com/c/en_in/products/security/vpn-endpoint-security-clients/what-is-vpn.html
- https://accushred.net/blog/pros-and-cons-of-using-external-hard-drives/
- https://www.partitionwizard.com/clone-disk/do-hard-drives-go-bad-if-not-used.html
- https://stackoverflow.com/questions/531576/why-is-windows-giving-my-hard-disk-the-letter-c-and-not-a-or-b-for-example
- https://www.lifewire.com/delete-photos-from-icloud-5218812
- https://cloud.google.com/learn/what-is-cloud-storage
- https://www.titanfile.com/blog/5-methods-of-protecting-data/
- http://www.laptoppricelist.in/kb/ssd-advantages-disadvantages
- https://www.cloudskillsboost.google/focuses/3483?parent=catalog
- https://www.datacenters.com/news/data-storage-101-the-basics-of-data-storage
- https://www.makeuseof.com/samsung-secure-folder/
- https://www.ibm.com/topics/data-storage
- https://www.samsung.com/uk/support/mobile-devices/what-is-the-secure-folder-and-how-do-i-use-it/
- https://ardrive.io/how-to-store-data-for-100-years/
- https://helpdeskgeek.com/help-desk/what-is-the-best-format-for-external-hard-drives-pros-cons-of-each/
- https://experience.dropbox.com/resources/long-term-backup
- https://auth0.com/blog/secure-browser-storage-the-facts/
- https://www.bemopro.com/cybersecurity-blog/local-vs.-cloud-storage
- https://www.techopedia.com/definition/29701/secure-data-storage
- https://www.backblaze.com/blog/how-reliable-are-ssds/
- http://www.datarecoveryspecialists.co.uk/blog/what-is-the-lifespan-of-an-external-hard-drive
- https://www.techtarget.com/searchstorage/tip/Advantages-and-disadvantages-of-storing-data-in-the-cloud
- https://progradedigital.com/capacity-speed-everything-you-need-to-know-about-sd-cards-for-cameras/
- https://osgamers.com/frequently-asked-questions/is-a-10-year-old-hard-drive-still-good
- https://www.linkedin.com/advice/0/how-do-you-implement-fallback-solutions-local-storage-cookies
- https://www.macworld.com/article/607017/devices-connected-to-icloud.html
- https://byjusexamprep.com/question-answers/which-unit-holds-data-permanently
- https://www.cloudwards.net/which-cloud-storage-has-the-best-security/
- https://helpdeskcavalry.com/how-to-safely-open-a-usb-drive-that-you-dont-own/
- https://www.avast.com/c-ssd-vs-hdd
- https://www.computerworld.com/article/3661355/the-essential-guide-to-icloud-login.html
- https://www.ampersandtech.com/2022/12/13/the-quick-differences-between-flash-vs.ssd-storage.html
- https://www.techopedia.com/definition/1119/storage-device
- https://7datarecovery.com/blog/recover-data-from-dead-hard-drive/
- https://unacademy.com/content/nda/study-material/computer/list-of-storage-devices/
- https://www.geeksforgeeks.org/difference-between-memory-and-hard-disk/
- https://www.trustworthy.com/blog/safe-to-store-passwords-on-google-drive
- https://www.crucial.com/articles/about-ssd/ssd-vs-hdd
- https://www.howtogeek.com/858426/whats-the-best-way-to-store-data-for-decades-or-centuries/
- https://www.tomsguide.com/best-picks/cloud-storage-vs-external-hard-disk-drive-which-one-is-better
- https://m.economictimes.com/top-trending-products/electronics/data-storage/top-6-best-high-capacity-external-hard-disks-for-your-data-storage-requirements/articleshow/98198661.cms
- https://www.ekransystem.com/en/blog/data-security-best-practices
- https://osgamers.com/frequently-asked-questions/is-local-disk-c-the-ssd
- https://www.broadbandcloudsolutions.co.uk/staying-virus-free-cloud/
- https://www.nibusinessinfo.co.uk/content/disadvantages-cloud-computing
- https://seamservices.com/blog/storage-media-a-list-of-the-different-types-of-devices/
- https://www.keepersecurity.com/secure-file-storage.html
- https://www.cbsnews.com/news/apple-my-photo-stream-icloud-how-to-save-your-photos/
- https://www.easeus.com/partition-manager-software/ntfs-or-exfat-external-hard-drive.html
- https://www.bestbackupreviews.com/guides/most-secure-way-to-store-files/
- https://www.digitalguardian.com/blog/what-usb-control-encryption
- https://www.easeus.com/computer-instruction/c-drive-vs-d-drive.html
- https://privacyinternational.org/campaigns/police-unlocking-your-data-cloud
- https://expertinsights.com/insights/50-cloud-security-stats-you-should-know/
- https://www.diskpart.com/articles/c-drive-vs-d-drive-speed-0725.html
- https://vaultastic.mithi.com/blogs/how-to-protect-your-cloud-data-from-hackers-6-ways-to-keep-your-data-safe/
- https://en.wikibooks.org/wiki/A-level_Computing/CIE/Computer_systems,_communications_and_software/Components_of_a_computer_system_and_modes_of_use/Types_of_hardware
- https://blog.bestbuy.ca/computers-laptops-tablets/harddrives-and-storage/external-hard-drive-vs-flash-drive-same-or-different
- https://www.tiny.cloud/blog/javascript-localstorage/
- https://www.prosofteng.com/blog/how-long-do-hard-drives-last
- https://esfandilawfirm.com/police-access-phone-remotely/
- https://www.cdw.com/content/cdw/en/articles/hardware/how-to-check-hard-drive-health.html
- https://www.informit.com/articles/article.aspx?p=1324280&seqNum=4
- https://www.machinedesign.com/automation-iiot/article/21832250/5-myths-surrounding-usb-flash-drives
- https://totalsafes.co.uk/pages/secure-storage
- https://www.toppr.com/ask/question/main-storage-is-also-called/
- https://www.techopedia.com/definition/6304/c-drive-c
- https://www.toppr.com/ask/en-gb/question/which-one-of-the-following-is-not-an-input-device/
- https://platinumdatarecovery.com/blog/8-tips-to-prevent-external-hard-drive-failure
- https://www.trustworthy.com/blog/store-paper-documents-long-term
- https://data-flair.training/blogs/computer-storage-devices/
- https://www.certosoftware.com/insights/apple-id-hacked-what-can-i-do/
- https://smallbusiness.chron.com/clean-out-d-drive-computer-55537.html
- https://www.partitionwizard.com/partitionmagic/best-ways-to-store-data-for-decades.html
- https://www.oracle.com/cloud/storage/what-is-cloud-storage/benefits/
- https://www.diskpart.com/articles/my-c-drive-is-full-without-reason-4348.html
- https://systemweakness.com/securing-local-storage-using-crypto-js-in-reactjs-2355f401c17f
- https://www.ricksdailytips.com/can-viruses-jump-to-another-drive/
- https://www.quora.com/Do-Windows-programs-have-to-always-be-installed-on-the-C-drive
- https://archive.unescwa.org/secure-digital-card
- https://www.easeus.com/storage-media-recovery/ssd-vs-hdd-lifespan.html
- https://www.kolide.com/blog/2023-s-least-and-most-secure-authentication-methods
- https://osgamers.com/frequently-asked-questions/is-it-ok-to-install-programs-on-d-drive
- https://www.comparitech.com/net-admin/best-usb-port-locking-tools/
- https://www.diskpart.com/articles/install-programs-on-second-hard-drive-0725.html
- https://ionic.io/docs/secure-storage
- https://byjus.com/govt-exams/computer-storage-devices/
- https://www.computerhope.com/jargon/d/defaultd.htm
- https://www.computerhope.com/issues/ch001696.htm
- https://www.crucial.in/articles/about-ssd/what-is-a-computer-data-storage-device
- https://www.cloudwards.net/how-cloud-storage-works/
- https://platinumdatarecovery.com/blog/advantages-and-disadvantages-of-memory-cards
- https://en.wikipedia.org/wiki/Local_storage
- https://tlitconnect.com/2019/07/can-cloud-storage-fail/
- https://docs.fortinet.com/document/fortianalyzer/7.4.0/best-practices/338373/secure-password-storage
- https://www.makeuseof.com/difference-between-c-drive-and-d-drive/
- https://www.siyavula.com/read/za/computer-applications-technology/grade-11/storage-memory-and-processing-devices/03-storage-memory-and-processing-devices
- https://www.bbconsult.co.uk/blog/cloud-security-who-owns-the-data/
- https://blog.motifphotos.com/which-is-better-for-keeping-your-photos-safe-icloud-vs-google-photos/
- https://www.pivotpointsecurity.com/local-storage-versus-cookies-which-to-use-to-securely-store-session-tokens/
- https://superuser.com/questions/284427/how-much-time-until-an-unused-hard-drive-loses-its-data
- https://www.pandasecurity.com/en/security-info/trojan/
- https://blog.logrocket.com/localstorage-javascript-complete-guide/
- https://ico.org.uk/for-organisations-2/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/principles/storage-limitation/
- https://www.vectra.ai/learning/cloud-security-threats
- https://superuser.com/questions/536886/what-happens-when-windows-runs-out-of-drive-letters