"Your privacy is very important to us."

If there is a better visual analogy for the crypto used by web sites to secure their dossier on you, I have not seen it:

Hundreds of files are exposed after a section of metal wall on the Iron Mountain secure storage warehouse was torn off by high winds. Iron Mountain employees on site refused to comment further on the damage nor the timeframe of repairs.

Previously, previously, previously, previously, previously, previously, previously, previously, previously, previously, previously, previously, previously, previously, previously, previously.

Tags: , , ,

6 Responses:

  1. Rich says:

    I suppose you could say it was a breeze to defeat it.

  2. Kyle Huff says:

    The picture needs more clowns in it somewhere.

  3. Tim says:

    Oblig. Simpsons:

  4. DaveL says:

    Isn't the purpose of Iron Mountain to store documents that by law or contract have to be kept for X years, and then destroy them? No one ever looks at them again unless there is a lawsuit.

    • giltay says:

      Some us use them to store offsite backups. Which I guess is good because no one ever needs to restore from offsite backups.

      We used to use them (or rather, a company they later acquired) to store reel-to-reel audio tapes (years of running time) which we did in fact get back to digitize. I must admit this news makes me feel a teensy bit less anxious about moving them to the clown.

    • yet another opinionated person says:

      You pay Iron Mountain with real money so that when you want something you've transferred to them for storage, you get it back undamaged, and with a legally clean chain of custody. Doesn't matter if it's only one backup tape or one (mostly empty) box of paper out of a billion items you've transferred to them.

      Just like a website that needs your name, email, ssn, credit card number, et cetera and then XOR's it with "SECRET_HUH_HUH" and stores everything in a public s3 bucket.

Leave a Reply

Your email address will not be published. But if you provide a fake email address, I will likely assume that you are a troll, and not publish your comment.

You may use these HTML tags and attributes: <a href="" title=""> <b> <blockquote cite=""> <code> <em> <i> <s> <strike> <strong> <img src="" width="" height="" style=""> <iframe src="" class=""> <video src="" class="" controls="" loop="" muted="" autoplay="" playsinline=""> <div class=""> <blink> <tt> <u>, or *italics*.

  • Previously