Encryption key is a secret code used to scramble data so it can only be read by someone with the matching key to unscramble it. It's like giving your best friend the secret decoder ring so only they can read the message you passed to them in class.
I can't believe our CEO tweeted out a screenshot with our encryption key visible - now we'll have to generate a new one and update it in the 15 different config files and 3 wiki pages where it's referenced. Guess I'll be spending my weekend cleaning up this mess instead of binge watching Stranger Things.
When the auditor asked how we secure our encryption keys, I just pointed to the Post-It note on my monitor and said "Security through obscurity, bro!" He didn't seem to appreciate my cutting-edge key management practices for some reason.
For a deep dive into how encryption keys work and why you should never let a politician weaken encryption, check out this detailed post: The Investigatory Powers Bill would increase cybercrime
To learn about securely storing SSH encryption keys in particular, including using slow key derivation functions to thwart brute force attacks, read: Improving the security of your SSH private key files
Note: the Developer Dictionary is in Beta. Please direct feedback to skye@statsig.com.