No, availability is not security!

Security is a very important factor in my choice of distributions and software solutions, and I tend to hold a very strict view of what it means from a modern computing standpoint. In one sentence, my stance on security is this: A sound and complete security posture has to take both physical and network security into account.

Anything less will not fly. So when I came across an article that attempts to sell that view short for the sole purpose of promoting a product, it didn’t sit well with me. The offending article was written by Frank Karlitschek, founder and CTO of Owncloud, a cloud storage service and solution.

In More to Security than Encryption, he takes this skewed stance that it is (somewhat) ok to say something is secure even though it lacks encryption. He then makes several points to support that stance.

Here’s what he wrote about availability and security:

Availability as security — If you own your data it can’t be lost because someone is shutting the cloud service down, or if AWS/Dropbox goes down.

Sure, but what good is not losing your data if an unauthorized party can access it just as easily and readily as you can. There’s no debating the benefits that cloud storage services bring to the table, but there’s an ongoing discussion about the security implications of dumping all your digital assets somewhere out there. I will not take a cloud service or solution that touts “availability as security” seriously. Your data is either secure or it’s not. Just being able to access it wherever and whenever does not count as security. Lost data can still be secure, if nobody else can access it. That’s one of the benefits of encryption.

The other points he made in that article are valid, though a few are debatable, but “availability as security” is dangerous and misleading.

Related Posts

How to replace LibreOffice with Apache OpenOffice on Fedora 20 For almost a year now, I've seldom had to use any component of LibreOffice, the default Office suite on virtually all desktop Linux distributions. ...
Why I switched from Postgres to MongoDB, then to Neo4j When you're about to start a project and are trying to make a decision on the what applications to use, one way to proceed is to find out what other p...
Ready for a digital world where the OS is the browser? I believe it was Scott McNealy, the former CEO and co-founder of the now defunct Sun Microsystems, Inc. who first tried to sell us on the idea of Clou...
How to build a Kali Rolling ISO of doom Editor: When you've finished building your Kali Rolling ISO of doom, take another step and enhance your ethical hacking and online penetration testing...
Don’t laugh, but the US has charged 5 Chinese military hackers with cyber espionage I don't know what category to fit this one in. I can't even bring myself to laugh, even though it makes for a good laugh. All I can do is shake and sc...
OpenShift Enterprise 1.0 announced OpenShift is a Platform-as-a-Service (PaaS) product from Red Hat, Inc., a leading open source technology software outfit based in Raleigh, North Carol...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


  1. Ostensibly

    The ‘availabily as security’ is more like a ‘security blanket’ or assurance from a parent that ‘you’re safe’ than “IT Security”. The ‘security’ in the author’s context would be more of the peace-fo-mind variety that the data is owned and housed by you ‘in the cloud’ as opposed to someone else, on thier systems, network, drives etc. Not so much that is is available to you but also that its location and control vectors are known.

  2. Pingback: Links 22/1/2013: Linux Outpaces Market Share of Windows, Mozilla Phone, Fedora Reviews Aplenty | Techrights

  3. This is a case of one sentence being taken out of context. The offending quote is only one part of an overall security policy – not a security policy by itself.

    While poorly written (and probably the reason it was misinterpreted) it makes the point that if you cannot access your data when you need it it doesn’t fulfill the security need or the reason you are putting your files into a cloud in the first place.

    After all, it doesn’t matter how secure anything is if not even the user has access to it.

  4. If you equate denial with theft, i.e., you don’t have it anymore, then the opposite of denial (availablity) is a form of security, and the active form of availability (resiliancy) is the best defense against denial of service or denial of access attacks.

    This translates best to network security, but it can translate to data/object security as well, where it forms the foundation of disaster recovery (defense against widespread vectors of vulnerability to denial of access attacks).

  5. Encryption is useless if it is just some serverside encryption where I do not control the algorithm and the keys. Encryption only benefits me if I am the keyholder, not some admin who will cooperate with the feds or whomever. Don’t forget Aaron!

Leave a Comment

Your email address will not be published. Required fields are marked *