Introduction to insecure data storage