Sunday, December 28, 2014

Netiquette IQ Blog For The Day - A Possible Solution For Privacy On The Internet!

A number of companies have recently expressed they are working on or have the capability to secure Internet email, messaging and content. None of these have, as yet, gained acceptance or been validated. Below is an article on another of these entities which promises to accomplish privacy very simply. There are some caveats, most notably hiving to subscribe to their metqork/service.

Time will soon tell! Stand by.

By Mark Prigg for MailOnline
Published: 13:19 EST, 24 December 2014 | Updated: 13:38 EST, 24 December 2014 

Online privacy breakthrough as British researchers claim to have developed way to give the internet a 'security layer'
  • Hope to commercialise their algorithm within months
  • Would allow 'one click' encryption of everything from from email to Facebook posts on a mobile phone
  • Expected to be offered as a subscription service by internet firms 
  • Messages can be accessed if they need to be by security services
It could give every internet user access to simple encryption - and make the internet a far more secure place.

Scientists at Scentrics, working with University College London, say they have created an algorithm that can guarantee total privacy for everything from emails and text messages.
Called 'the construct', they hope the system could be used to give everything from desktop machines to mobile phones simple to use encryption.
The Construct is the name given to the algorithm which thwarts the MiTM results in a fully automated, standards based cryptographic key management protocol for TCP/IP and the UMTS network.
It means 'one click privacy' ­ in an instant, and handles all of the key exchange and encryption that is needed - without the user having to do anything.

If you are not connected when you receive a message for example (in its messaging security application), then you will be invited to join the key management service. 

The company is headed by a computer scientist and mathematician, Paran Chandrasekaran, who used to be technology counsellor to the Prince of Wales' Business Advisory Board.
'This allows people to lock their digital front doors and alarm their online lives,' he told

'The challenge is to give crypto to the masses, make it a one click solution and comply with corporate security. 

'What we have developed is an algorithm that places a security layers into the DNA of the internet - it will have crypto for the masses, and you won't even need a special app.'
The company has found a way of defeating what cryptologists call 'the man-in-the-middle attack' or MITM – the ability of someone to hack and intercept an electronic message.
This requires an attacker to have the ability to both monitor and alter or inject messages into a communication channel. 

One example of this used by hackers is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. 
In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.

I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me

If you have not already done so, please view the trailer for my book below.