Analog hole

Analog hole
Analog hole - Wikipedia

The easiest way to "unofficially" download a song from Spotify is to record the sound going to your speakers.

This applies to almost anything. I often see people at work discussing basic infosec topics but forgetting about this hole:

— "How do we stop this PDF from being shared by this person? (an employee, customer, provider, or outsider)"
— "Let’s remove the share button, make the link one-time use, password-protect the file, disable right click, and block screenshotting."
— The person just takes a photo of the document with their phone.
— "Fine, let’s make them sign an NDA and a Non-Compete!"

I guess you can imagine how that goes from here...

Don’t waste time trying to restrict what can’t be restricted: visuals, sounds, ideas, knowledge.


Me: Security measures that try to prevent people from sharing information they can already see or hear are pointless. If someone has access, they can always find a way to capture and share it, making restrictions ineffective.

__: While absolute prevention is impossible, friction-based security can still add value by making leaks more difficult, increasing traceability, and deterring casual mistakes.

Me: But adding friction often backfires—it pushes people toward untraceable workarounds like taking a photo instead of downloading a file. This reduces visibility and creates a false sense of security while making real leaks harder to track.

__: That’s a fair point—people are great at bypassing restrictions when motivated. Instead of blocking actions, should we focus on early detection and response rather than friction-based prevention?

Me: Exactly. Access control should be the primary preventive measure. If someone shouldn’t see a document, they shouldn’t have access at all. Beyond that, we should prioritize detection, response, and accountability over trying to prohibit inevitable actions.

__: I see the logic in that. But what about short-term friction during high-risk periods (e.g., M&A deals, pre-launch products)? Temporary restrictions can slow down leaks just long enough to protect critical information.

Me: I get the idea, but friction measures operate on seconds, while these risk periods last days or weeks. A determined person can bypass friction instantly, so even in high-risk scenarios, early detection and containment are better strategies than prohibitions.

__: That makes sense. Instead of using friction to stop actions, we could use it as a trigger for detection—for example, logging when someone prints a sensitive document.

Me: Yes, and there’s also psychological friction—reminders like “This action will be logged” or “Sharing this document violates company policy” can deter people from making bad decisions.

__: Agreed. So, we’re saying:

  1. Access control is the primary preventive measure.
  2. Friction should support detection, not block actions.
  3. Psychological deterrents can help reinforce security.
  4. Early detection & response matter more than restrictive controls.
  5. Security should be transparent and auditable, not obscure and restrictive.

Me: Exactly. Security should focus on real risk management, not just adding friction for the illusion of control.

__: Agreed. Well-structured security should guide behavior while keeping leaks visible, auditable, and attributable rather than pushing them into the shadows.


Questions asked:

  • How to download a song from Spotify?
  • Ways to get around file sharing restrictions?
  • How do I stop someone from leaking a document?
  • Can you prevent someone from taking screenshots of a document?
  • Do NDAs really stop people from sharing sensitive info?