1 / 22

Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe’s SAFE Network Ian M. Kenway

This report discusses the state of cybersecurity in the post-Snowden era, particularly focusing on the progress made by MaidSafe's SAFE Network. It explores threats to cybersecurity, NSA surveillance programs, cybersecurity failures, and the company MaidSafe itself.

cravens
Download Presentation

Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe’s SAFE Network Ian M. Kenway

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe’s SAFE Network Ian M. Kenway DKE Research Seminar COMSC Cardiff University 27 February 2017 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  2. Centre for Information Ethics and Public Policy The Centre for Information Ethics and Public Policy (CIEPP) is a not for profit organisation exclusively committed to the following three Objects: (i) to promote the study of information ethics as a fundamental domain of ethical inquiry; (ii) to monitor and assess the societal and economic impacts of public policy on the development and use of information and communication technologies; and (iii) to undertake or commission quality research, teaching and publishing activities or projects consistent with Objects 1 & 2. Centre for Information Ethics and Public Policy Centre for Information Ethics and Public Policy Centre for Information Ethics and Public Policy HomeMediaWatchResourcesNewsContact HomeMediaWatchResourcesNewsContact HomeMediaWatchResourcesNewsContact Mission The Centre for Information Ethics and Public Policy (CIEPP) is a not-for-profit organisation exclusively committed to the following three Objects: • to promote the study of information ethics as a fundamental domain of ethical inquiry; • to monitor and assess the societal and economic impacts of public policy on the development and use of information and communication technologies; and • to undertake or commission quality research, teaching and publishing activities or projects consistent with Objects 1 & 2. Mission The Centre for Information Ethics and Public Policy (CIEPP) is a not-for-profit organisation exclusively committed to the following three Objects: • to promote the study of information ethics as a fundamental domain of ethical inquiry; • to monitor and assess the societal and economic impacts of public policy on the development and use of information and communication technologies; and • to undertake or commission quality research, teaching and publishing activities or projects consistent with Objects 1 & 2. Mission The Centre for Information Ethics and Public Policy (CIEPP) is a not-for-profit organisation exclusively committed to the following three Objects: • to promote the study of information ethics as a fundamental domain of ethical inquiry; • to monitor and assess the societal and economic impacts of public policy on the development and use of information and communication technologies; and • to undertake or commission quality research, teaching and publishing activities or projects consistent with Objects 1 & 2. Slide2 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  3. Threats to Cybersecurity (i) The State Itself (ii) Malevolent Third Parties Slide3 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  4. NSA Internet Surveillance Programmes Cracking Cryptography “The NSA and GCHQ have been undertaking systematic effort to undermine encryption, the technology which underpins the safety and security of the internet, including email accounts, commerce, banking and official records.” The Guardian Slide4 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  5. NSA Internet Surveillance Programmes PRISM TEMPORA UPSTREAM Slide5 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  6. Cybersecurity Failures Two Examples: Ashley Madison Yahoo Slide6 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  7. Ashley Madison The company received attention on July 15, 2015, after hackers stole all of its customer data—including emails, names, home addresses, sexual fantasies and credit card information—and threatened to post all the data online if Ashley Madison and fellow Avid Life Media site EstablishedMen.com were not permanently closed. https://en.wikipedia.org/wiki/Ashley_Madison Slide7 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  8. Yahoo “Yahoo said on Wednesday (14/1216) it had discovered another major cyber attack, saying data from more than 1bn user accounts was compromised in August 2013, making it the largest such breach in history.” “The number of affected accounts was double the number implicated in a 2014 breach that the internet company disclosed in September and blamed on hackers working on behalf of a government.” https://www.theguardian.com/technology/2016/dec/14/yahoo-hack-security-of-one-billion-accounts-breached Slide8 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  9. MaidSafe – the Company “Started in 2006 by Scottish engineer David Irvine.” “MaidSafe is a small team, comprised of: thinkers, inventors, tinkerers, PHDs, engineers and designers.” “Although based in Troon, Scotland, it draws talents from many different cultures and countries.” Its declared mission: “A desire to provide security and privacy for everyone.” https://maidsafe.net/company.html The Guardian Slide9 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  10. Features of the SAFE Network The SAFE (Secure Access For Everyone) Network is made up of the unused hard drive space, processing power and data connection of its users. It offers a level of security and privacy not currently available on the existing Internet and turns the tables on companies, putting users in control of their data, rather than trusting it to organisations. A number of features make this possible: https://maidsafe.net/features.html The Guardian Slide10 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  11. Login and secure your data with no middle man “No need to give your password to anyone, or ask a third party’s permission to access your data. Your information, and access to it, belongs to you!” https://maidsafe.net/features.html Slide11 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  12. Self-Encryption: Data which encrypts itself, with itself. “Files uploaded to the network are broken into pieces, encrypted and distributed across the network. This process is called Self-Encryption.” https://maidsafe.net/features.html Slide12 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  13. Distributed network with opportunistic data caching. “The SAFE Network is fully decentralised, with files distributed and stored all over the world, on different devices. This allows the network to be robust to attacks, with no central point of weakness.” https://maidsafe.net/features.html Slide13 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  14. Data availability and built-in redundancy. “The network is programmed to keep duplicate copies of each piece of data at all times. As users turn their computers off, the network makes more copies and stores them on other machines, ensuring that users always have access to their files.” https://maidsafe.net/features.html Slide14 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  15. Unneeded duplicates are automatically removed. “Once a file is uploaded, other users who upload the same file will be automatically referred to the original, limiting the number of copies and reducing the computing resources needed to store it.” https://maidsafe.net/features.html Slide15 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  16. SafeCoin – Global Distribution without human intervention “Safecoins are distributed entirely by the algorithms within the SAFE Network. Human beings are not involved in the process. Only 4.3 billion coins will ever be in circulation at one time and each will have its own unique identity.” https://maidsafe.net/safecoin.html Slide16 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  17. Farming: an incentive for a crowd sourced Internet. “Safecoins are given as an incentive to users for providing their resource to the network. This resource is their: storage space, CPU, bandwidth and online time that enable the encrypted chunks of network data to be stored and retrieved from their computer. The process of providing resource and receiving safecoin in return is called ‘Farming’.” https://maidsafe.net/safecoin.html Slide17 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  18. Roadmap - Past Milestones Test 1:  Feb 26th 2016 Client test. The release of the SAFE Launcher and the SAFE Demo App enabling users to create their own account, and to store/retrieve private data. Test 3:  May 17th 2016 The first iteration of enabling users run vaults. Alpha 1:  Aug 12th 2016 Release of the alpha network and API version 0.5. Test 9:  Sep 16th 2016 Enable users to send and receive SAFE Email. This new functionality also serves as the first developer tutorial. https://maidsafe.net/roadmap.html Slide18 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  19. Safe Network Unlike JonDonym or JonDo (formerly JAP) and the more well known Tor, the SAFE Network represents a complete re-think about data security and personal anonymity. More specifically, it is not a security bolt-on to the internet but a bottom up re-envisioning of how the internet can overcome its current security weaknesses which offer considerable challenges to those with a legitimate and fundamental desire to keep their data safe Slide19 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  20. Safe Network Unlike JonDonym or JonDo (formerly JAP) and the more well known Tor, the SAFE Network represents a complete re-think about data security and personal anonymity. More specifically, it is not a security bolt-on to the internet but a bottom up re-envisioning of how the internet can overcome its current security weaknesses which offer considerable challenges to those with a legitimate and fundamental desire to keep their data safe Slide20 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  21. Issues 1. Slowness of project 2. Complexity 3. Attractiveness 4. Growth of adopters 5. App development Slide21 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

  22. Q & A Discussion Slide22 Cybersecurity in the post-Snowden era: A Progress Report on MaidSafe's SAFE Network

More Related