Why and how to Encrypt

Photo by Nik MacMillan on Unsplash

In the era of Facebook data scandals and Edward Snowden whistleblowers, data has never been as valuable as it is today.

Consumers are starting to catch on that their data is actually valuable. Enterprises and businesses have always understood (and profited from) the value of data. When you have something valuable, you protect it.

One of the most powerful tools we have to protect application-layer data is encryption, but it’s challenging to evaluate and integrate an application layer encryption system into products, processes, and businesses.

Depending on who your customers are, different values drive the demands for data protection. We…


Photo by Jeremy Bishop on Unsplash

Anyone can copy-and-paste AES invocations from StackOverflow. But the hard part of data security is the key lifecycle management, crypto-agility, centralized controls, and secure key distribution mechanisms. You can skim 6 Questions to Ask Before Encryption Application Layer Data to get a better sense of the responsibilities that come with encrypting data. But in short, no one should be reinventing the wheel.

Luckily, we can just use Peacemakr to solve these hard problems.

Peacemakr’s E2E-Encryption Python SDK

Peacemakr provides free E2E-Encryption-as-a-Service in an open-source Python SDK. Of course, it supports other languages too. Peacemakr uses a dedicated SaaS to provide centralized configuration management for…


Discover the easiest command line tool to encrypt and decrypt a file or stdin

(1) Install this CLI:

# Install peacemakr
brew tap peacemakr-io/peacemakr
brew install peacemakr

(2) Authenticate to fetch your encryption keys:

# Authenticate to Peacemakr's Demo Org for access to demo keys
export PEACEMAKR_APIKEY=d1Maw58P2xCQ8d0GV15n22SQNI6lYXHzWLCTEvNPHnY=

By the way, if you don’t want to use a demo account, then signup for a free account to use your own keys.

(3) Encrypt your file:

peacemakr -encrypt --inputFileName to-encrypt.txt --outputFileName encrypted.txt

Decrypt your file:

peacemakr -decrypt --inputFileName encrypted.txt --outputFileName decrypted.txt

Or even Encrypt and Decrypt with standard input:

echo "Hello Encrypted World" | peacemakr -encrypt

Wait. What key was used to encrypt?

If you haven’t done so already, you need to signup for a free account to use your own keys, or else you’re…


Ashley Sumner, I stand with you.

Ashley Sumner struck out the “female” from her title as a founder, and everyone noticed.

How do you change the world?

There are two ways to approach change:

  1. Navigating the discourse, and engaging arguments directly
  2. Rejecting the discourse, and poking fun at it from the outside

What the hell does that mean?

Think of (1) as directly engaging the content of the 2-sided political debate. So, for example, if we’re going to engage the patriarchal discourse, we would point out the disadvantages and structural sexism that female founders face. We use the language of the discourse to try to make solid arguments for change.

On the…


Photo by Possessed Photography on Unsplash

With an increasing cost of data breaches from new laws like CCPA (effective 2020) and existing GDPR (effective 2018), the cyber insurance industry’s days are numbered. Are you ready?

Outdated Incentive Structure

Instead of solving your cybersecurity problems, cyber insurance companies capitalize on your amortized cost given the probability of a breach. It’s economically viable because data breaches have been relatively cheap.

Historically, protecting your data has been a very time-consuming and expensive commitment. For example, it used to take $4.2M and a team of 4–5 security engineers to build E2E-Encryption over 2 years into a product. In that world, cyber insurance presented…


Encrypting data is easy, but securing keys is very difficult. You can skim 6 Questions to Ask Before Encryption Data to get a better sense of the responsibilities that come with encrypting data.

Luckily, we can just use Peacemakr to solve these hard problems.

Peacemakr’s E2E-Encryption Python SDK

Peacemakr provides free E2E-Encryption-as-a-Service through an open-source Python SDK. Of course, it supports other languages too. Under the hood, Peacemakr uses a dedicated SaaS to provide centralized configuration management to make your E2E-Encryption simple and fast.

Peacemakr: The Easiest way to Encrypt in Python

#1 Install Dependencies

Since the Peacemakr SDKs are open-source, you may download from the source directly on GitHub. Otherwise, just

$ pip install…

Photo by Markus Winkler on Unsplash

If you’re not getting hacked, then you’re probably not important enough to matter. For the few startups that do make it, you’re going to get unsolicited feedback from the security community. The attention will be especially early if you go around boasting how secure you are.

You mine as well just paint a giant red bullseye on your product.

But do you seriously think that when the hackers come knocking at your doors, then that will be an excellent indicator to prioritize that backlog of good-problems-to-have in security? Rush out and hire a security expert or two? By then, it…


And how encryption makes the problem go away.

Photo by Crawford Jolly on Unsplash

Joe Sullivan, former CSO of Uber, is finding out the hard way. Back in 2017, he issued a $100,000 bug bounty in Bitcoins to a hacker that was able to dump a database. Sullivan required them to sign NDA, which was also odd. He failed to report it to the FTC (which was investigating a similar 2014 data branch).

It not only looked suspicious but brought felony charges on August 19, 2020, for obstruction of justice and concealing a felony. Hacking is a federal crime, and not-reporting it is a crime.

But…


And why Open-Source Communities lead us into the future.

Photo by William White on Unsplash

Money can buy all the engineering time in the world, but it doesn’t mean you’re building something useful. Hiring the best engineers in the world doesn’t guarantee they will create something amazing.

When we come up with ingenious innovation, the product itself will only get so far by itself. We’ll explore how Open Source Communities lead to better service the demanding early-majority markets, the need of finding and retaining top engineering talent, and how to build kick-ass products that crush the competition.

Build a Movement, Not a Collection of Products.

I know what you’re thinking, “Movements suffer from credibility issues. They do not speak to the values of…

Jon McLachlan

15+ Years experience leading security, Ex-Apple, Ex-Pure Storage, Ex-Symphony Communications, Co-Founder and CEO of Peacemakr, Lives in San Francisco.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store