Sunday, March 29, 2015

New technology can stop pretty role – Swedish newspaper Svenska Dagbladet

Hacking today remain undetected for months can be revealed in a second and, by extension, the new technology also mean the end for pretty role.

Today’s data security to build protective walls around computers or servers. With security software and firewalls, we try to stop malware and other types of intrusions. The war goes as most people probably do not know anything further. Computer criminals are earning huge money on their business and can continuously develop its technology.

Ericsson, together with the small Estonian security company GuardTime chosen a new approach – if you can not protect your computers so you can instead make all the data sure. It is useless to try to calculate how many billions of files it is about because the number is growing every second. On the computer where this writing there are 100 gigabytes (GB) of data and on the whole internet is in very round figures 5 billion gigabytes of data. In addition there are software in phones, tablets, routers, televisions, cars and anything else that can fit in the concept of IoT (Internet of Things, IOT).

“It teaches course take a while to process it data set, “you think now.

The answer from Stefan Jung, head of Ericsson’s security products, is under the draw in Kista mildly surprising:

– We can sign all data on the Internet over a second, he notes cards.

The so-called KSI technology from the Guard Time is a wet dream for all mathematicians, but very simply, one can say that each data file gets an identification mark or signature with three unique characteristics: the time when it was created, a mathematical proof that the file is not altered or tampered with and who created it. The evidence that is created is universal and can be witnessed by everyone, there are no keys in the system so that no need to rely on someone else to ensure what is true or not. For example, if an Excel file is changed, it must be signed again.

If someone tries to get into an unsigned file in a computer or network alarm goes off immediately and intrusion attempt can be stopped. It is unlikely that any nätskurk would send malicious code in a signed file that can be traced to the author.

– You can never falsify history. We simply can prove what is true on the internet, says Stefan Jung.

Ericsson launched the new technology at Mobile World Congress in Barcelona a few weeks ago and expects to have it in operation during the third quarter of this year.

It is sold is a KSI client that signs the files and the potential buyer is telecom and broadband operators, banks, insurance companies, government agencies and all others who are interested in secure data. As an ordinary consumer can take advantage of the technology if it is provided by your mobile or broadband service provider.

One of the major advantages is that the technology is not based on encryption. When the whistle-blower Edward Snowden stole documents from the security NSA, he had come across a fellow worker’s encryption keys and he hid the interference by changing the system’s log files.

– Snowden had been detected directly with this system, says Stefan Jung.

The technology can obviously be used to reduce the role’s pretty activities and the whole problem of phishing when authenticity can be verified and the sender traced. But does this mean the end of anonymity on the Internet?

– It depends on how the technology is implemented. We see this rather as a way to ensure that personally identifiable information is handled correctly in relation to laws and regulations, and that it can be proved, which is basically impossible today.

LikeTweet

No comments:

Post a Comment