Time will soon tell! Stand by.
=======================================================
By Mark Prigg
for MailOnline
Published: 13:19
EST, 24 December 2014 | Updated: 13:38 EST, 24 December 2014
Online
privacy breakthrough as British researchers claim to have developed way to give
the internet a 'security layer'
- Hope to commercialise their algorithm within months
- Would allow 'one click' encryption of everything from from email to Facebook posts on a mobile phone
- Expected to be offered as a subscription service by internet firms
- Messages can be accessed if they need to be by security services
It could give
every internet user access to simple encryption - and make the internet a far
more secure place.
Scientists at
Scentrics, working with University College London, say they have created an
algorithm that can guarantee total privacy for everything from emails and text
messages.
Called 'the
construct', they hope the system could be used to give everything from desktop
machines to mobile phones simple to use encryption.
The Construct
is the name given to the algorithm which thwarts the MiTM results in a fully
automated, standards based cryptographic key management protocol for TCP/IP and
the UMTS network.
It means 'one
click privacy' in an instant, and handles all of the key exchange and
encryption that is needed - without the user having to do anything.
If you are not
connected when you receive a message for example (in its messaging security
application), then you will be invited to join the key management
service.
The company is
headed by a computer scientist and mathematician, Paran Chandrasekaran, who
used to be technology counsellor to the Prince of Wales' Business Advisory
Board.
'This allows
people to lock their digital front doors and alarm their online lives,' he told
DailyMail.com.
'The challenge
is to give crypto to the masses, make it a one click solution and comply with
corporate security.
'What we have
developed is an algorithm that places a security layers into the DNA of the
internet - it will have crypto for the masses, and you won't even need a
special app.'
The company has
found a way of defeating what cryptologists call 'the man-in-the-middle attack'
or MITM – the ability of someone to hack and intercept an electronic
message.
This requires
an attacker to have the ability to both monitor and alter or inject messages
into a communication channel.
One example of
this used by hackers is active eavesdropping, in which the attacker makes
independent connections with the victims and relays messages between them to
make them believe they are talking directly to each other over a private
connection, when in fact the entire conversation is controlled by the
attacker.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
=======================================
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a
member of the International Business Etiquette and Protocol Group and
Minding Manners among others. I regularly consult for the Gerson Lehrman
Group, a worldwide network of subject matter experts and I have been
contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am the president of Tabula Rosa Systems,
a “best of breed” reseller of products for communications, email,
network management software, security products and professional
services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
===============================================
No comments:
Post a Comment