“It teaches the take awhile to process the data set,” you think now.
The answer from Stefan Jung, head of Ericsson’s security products, is under the draw in Kista mildly surprising:
– We can sign all data on the internet for one second, he says shortly.
The so-called KSI technology from the Guard Time is a wet dream for all mathematicians, but very simply, that each data file gets an ID label or signature with three unique characteristics: the time it was created, a mathematical proof that the file has not been altered or tampered with and who created it. The evidence that is created is universal and can be witnessed by everyone, there are no keys in the system so that no need to rely on someone else to ensure what is true or not. For example, if an Excel file is changed, it must be signed again.
If someone tries to get into an unsigned file in a computer or network alarm goes off immediately and intrusion attempt can be stopped. It is unlikely that any nätskurk would send malicious code in a signed file that can be traced to the author.
– You can never falsify history. We simply can prove what is true on the internet, says Stefan Jung.
Ericsson launched the new technology at Mobile World Congress in Barcelona a few weeks ago and expects to have it in operation during the third quarter of this year.
It is sold is a KSI client that signs the files and the potential buyer is telecom and broadband operators, banks, insurance companies, government agencies and all others who are interested in secure data. As an ordinary consumer can take advantage of the technology if it is provided by your mobile or broadband service provider.
One of the major advantages is that the technology is not based on encryption. When the whistle-blower Edward Snowden stole documents from the security NSA, he had come across a fellow worker’s encryption keys and he hid the interference by changing the system’s log files.
– Snowden had been detected directly with this system, says Stefan Jung.
The technology can obviously be used to reduce the role’s pretty activities and the whole problem of phishing when authenticity can be verified and the sender traced. But does this mean the end of anonymity on the Internet?
– It depends on how the technology is implemented. We see this rather as a way to ensure that personally identifiable information is handled correctly in relation to laws and regulations, and that it can be proved, which is basically impossible today.
No comments:
Post a Comment