IT-Security and the Distributed Social Graph
IT-Security and the Distributed Social Graph
We currently accept that all Internet appliances need to listen for traffic on certain ports, interact using certain protocols and may have code vulnerabilities welcoming an attacker to gain control. But why on Earth should my printer accept connections from anywhere on the planet if only me and my colleagues are supposed to print on it?
The distributed private social graph can be the next generation of firewall logic: only the cryptographic keys that my secushare instance gave to the printer are enabled to talk to the printer. Other network traffic doesn't even get close to it. People who need access are cryptographically authenticated without a hassle, because the social graph already provides for all the necessary information.
No reason for traditional firewall technology to take wild guesses on which traffic may be legitimate to let through. With the social graph in place the firewall simply lets traffic of known people pass and blocks strangers.
Contents
Who wants an insecure Internet of Things?
No reason for the Internet of Things to be remote controlled from a website in the cloud. Like a bluetooth device they could learn the cryptographic identity of their owner at the press of a button, and from there, be controllable and configurable to offer services to the entire family or company staff.
secushare makes people the gatekeepers to their technology. It turns them into real owners of the devices they bought.
It's that simple, and it could spell a revolution for the entire information technology security business. Maybe IT security will never be the same after the introduction of pervasive cryptographic authentication and the availability of a distributed social graph.
Did we mention that pervasive social authentication also removes the need for passwords? Passwords are among the biggest vulnerabilities in IT security.