Networks of the future
by Thomas on Aug 26, 2014 10:29:07 AM
The very openness of the early internet fueled its growth worldwide. Packet-switched networks, borne of a Cold War era fear of nuclear devastation, were built to be easy to set up, and resilient to outages and failures.
We’ve come to learn that thieves, governments, and corporations have exploited this openness to amass (what was thought to be) private data on an enormous scale. And while we must use these open networks to participate in today’s connected society, it doesn’t mean that we must relinquish our expectation of privacy when we use them.
So we use encryption. Encryption has a storied history, dating back to Spartan armies scrambling messages passed on tablets. Like all forms of encryption throughout history, the idea is that a secret message is hidden somehow in a manner that can be transmitted openly, but only a trusted few can understand.
With packet-switched networks, that encryption needs to be in two places — in transit, while the data is being communicated to the server, and in storage, when the data is “at rest” (so to speak) in the cloud.
In transit, your data is protected with SSL, which is a great start. SSL works as sort of a system of trust based on certificates — people typically will purchase a certificate for their server, guaranteeing that server is who it’s representing itself to be. With certified servers on both sides of the data transmission, that data is secure and encrypted while it’s in motion.
It isn’t perfect. An error in an SSL library caused the famous Heartbleed bug, which affected millions of servers across the internet. The library is maintained by a small group of people with limited funding, but now has much more attention from large companies and organizations that have a vested interest in a secure internet.
When your data isn’t moving around, there are a variety of ways it can be encrypted on the server — all revolving around the idea of private key cryptography. Here’s a great video that explains it with paint. The basic idea is that you can secure a file with two keys, a public key and a private key. A public key is like a really strong lock, which can’t be opened unless you have the private key. You can even give away copies of the lock so other people can encrypt things for only you. Others can close the lock, but only you have the private key to open the lock.
This isn’t perfect either. First, you have to be certain you’re the only one in possession of the private key. If you make copies of that key, everyone who has a copy can access your data. Other storage providers, like Google and Dropbox, keep a copy of your key. They say this is for convenience, but oftentimes with cryptography, convenience leads to insecurity. Since privacy is so important to us, Sync doesn’t keep copies of your private key.
The combination of these two methods of encryption keep your data away from bad actors who want to capture and exploit your personal data for their own ends. Thieves stealing passwords through phishing, corporations mining your data, and governments reading your emails all rely on the fact that not every communication is encrypted with both methods. The more plain text they can harvest, the more powerful they can become.
Platforms like Sync, along with other technologies like VPN, Tor, secure email (with PGP, and now Dime), local file system encryption, and strong passwords can all work together to form a patchwork quilt of security. Legislation (like HIPAA) can encourage companies to take more care with private data. But what is really needed is a stronger, more cohesive technical shield around your information.
For these more protective networks of the future, Sync believes all data must be encrypted by default — from source to server to destination — to keep private information private. Along with Sync for storage, security researchers, motivated by recent events, are just now beginning to develop other platforms to do that.
- February 2025 (2)
- January 2025 (1)
- December 2024 (1)
- November 2024 (2)
- October 2024 (5)
- September 2024 (6)
- August 2024 (3)
- July 2024 (6)
- June 2024 (4)
- May 2024 (4)
- April 2024 (7)
- March 2024 (4)
- February 2024 (5)
- January 2024 (5)
- December 2023 (1)
- November 2023 (3)
- October 2023 (3)
- September 2023 (2)
- August 2023 (5)
- July 2023 (2)
- June 2023 (4)
- May 2023 (2)
- March 2023 (2)
- February 2023 (1)
- January 2023 (3)
- December 2022 (1)
- November 2022 (3)
- October 2022 (2)
- August 2022 (3)
- July 2022 (1)
- June 2022 (1)
- May 2022 (2)
- April 2022 (1)
- March 2022 (2)
- January 2022 (4)
- December 2021 (2)
- October 2021 (3)
- September 2021 (3)
- August 2021 (1)
- July 2021 (5)
- June 2021 (4)
- May 2021 (3)
- April 2021 (4)
- March 2021 (5)
- February 2021 (2)
- January 2021 (5)
- December 2020 (1)
- November 2020 (2)
- September 2020 (1)
- August 2020 (1)
- July 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (3)
- February 2020 (1)
- November 2019 (1)
- October 2019 (1)
- August 2019 (1)
- May 2019 (1)
- April 2019 (1)
- February 2019 (1)
- January 2019 (2)
- December 2018 (1)
- October 2018 (2)
- September 2018 (4)
- June 2018 (1)
- May 2018 (1)
- March 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (2)
- September 2017 (1)
- August 2017 (2)
- May 2017 (2)
- April 2017 (1)
- January 2017 (2)
- July 2016 (3)
- June 2016 (3)
- February 2016 (1)
- November 2015 (1)
- September 2015 (1)
- August 2015 (4)
- May 2015 (4)
- January 2015 (2)
- October 2014 (1)
- September 2014 (1)
- August 2014 (2)
- July 2014 (5)
- June 2014 (2)
- March 2014 (1)
- December 2013 (1)
- October 2013 (1)
- September 2013 (1)
- July 2013 (4)
- June 2013 (2)
- April 2013 (1)
- February 2013 (1)
- January 2013 (1)
Subscribe by email
You May Also Like
These Related Articles

10 tips to keep your business data safe

From soup to search warrants
