[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [GNUnet-developers] Project proposal: The GNUnet of autonomous Thing
carlo von lynX
Re: [GNUnet-developers] Project proposal: The GNUnet of autonomous Things
Wed, 23 Nov 2016 09:44:01 +0100
On Fri, Nov 18, 2016 at 01:30:37PM +0100, Hauke Mehrtens wrote:
> This sounds interesting.
Yes, Daniel.. keep up that good work you are doing!
> 3. What would be the difference to for example IoTvity, openHAB and
> other existing solutions?
Haven't seen an answer from Daniel and maybe you find
this "answer" from our website interesting anyhow. Our
project is called secushare. We design a distributed
social network on top of GNUnet and see IoT as one of
its potential applications:
IT-Security and the Distributed Social Graph
We currently accept that all Internet appliances need to listen for
traffic on certain ports, interact using certain protocols and may have code
vulnerabilities welcoming an attacker to gain control. But why on Earth should
my printer accept connections from anywhere on the planet if only me and my
colleagues are supposed to print on it?
The distributed private social graph can be the next generation of
firewall logic: only the cryptographic keys that my secushare instance gave to
the printer are enabled to talk to the printer. Other network traffic doesn't
even get close to it. People who need access are cryptographically
authenticated without a hassle, because the social graph already provides for
all the necessary information.
No reason for traditional firewall technology to take wild guesses on
which traffic may be legitimate to let through. With the social graph in place
the firewall simply lets traffic of known people pass and blocks strangers.
Who wants an insecure Internet of Things?
No reason for the Internet of Things to be remote controlled from a
website in the cloud. Like a bluetooth device they could learn the
cryptographic identity of their owner at the press of a button, and from there,
be controllable and configurable to offer services to the entire family or
secushare makes people the gatekeepers to their technology. It turns
them into real owners of the devices they bought.
It's that simple, and it could spell a revolution for the entire
information technology security business. Maybe IT security will never be the
same after the introduction of pervasive cryptographic authentication and the
availability of a distributed social graph. Did we mention that pervasive
social authentication also removes the need for passwords? Passwords are among
the biggest vulnerabilities in IT security.
You can find more on the topic at
if you can afford to browse the net naked.
E-mail is public! Talk to me in private using encryption: