The dawn of safe Internet
Right before our own eyes, the world is changing as dynamically as never before in its entire history. We are not only witnesses but also the main protagonists of transitioning into the virtual world.Jarek Rybus, Futuresalt LTD.
Who has the control over the data and how can they use them? We don’t have to go that far back to imagine the ominous scenarios of violating our privacy.
The transfer of people to the parallel virtual world is being accompanied by constant support: there are new technologies of transmitting data over public networks being made, the 5G network is developing, the augmented reality is conquering the market, and the Internet of Things is entering our houses with increasing confidence. The deep learning, on the other hand, is among the leading interests of the scientific world.
After successful implementation of these solutions on a mass scale, our transition will speed up and will be taking place in the instant mode. Even when we sleep.The need to build a new global network with a communication standard that will enable it to combine all data, ensure its integrity and most of all safety, while also enabling us to make use of its potential, has never been as evident as it is now. Implementing it might have an impact on development of societies and safety of countries.
New world – New web
Simplicity is recommended. Users, producers, scientists need to have an incredibly simple and safe access to the new web at every stage of life. This type of connectivity might only be ensured by the blockchain technology combined with hybrid solutions based on the new web. Safety, speed, stability and most of all decentralization of services – that’s the key to creating a new technological society.
BASTION Network will be an invisible technology that we use every day, something that is now called TCP/IP and Public Key Infrastructure.Łukasz (Luke) Klejnberg, Futuresalt LTD.
It looked so promising
Protecting our identity in the global world has become crucial. In order to read an e-mail, chat on a messenger or comment a picture on social media, we need to have password-protected profiles. In most cases, however, it is too poor and not changed often enough.The Internet was meant to be a medium for education, sharing information, making acquaintances, but in reality it has become a hotbed for attacks, frauds, identity theft, extortions. It’s hard to blame the Internet. This allegation should be directed at the users.
- In 2016, 3 billion Yahoo accounts were hacked in one of the biggest breaches of all time.
- In 2016, Uber reported that hackers stole the information of over 57 million riders and drivers.
- In 2017, 412 million user accounts were stolen from Friendfinder’s sites.
- In 2017, 147.9 million consumers were affected by the Equifax Breach.
- According to 2017 statistics, there are over 130 large-scale, targeted breaches in the U.S. per year, and that number is growing by 27 percent per year.
- Thirty-one percent of organizations have experienced cyber attacks on operational technology infrastructure.
- 100,000 groups in at least 150 countries and more than 400,000 machines were infected by the Wannacry virus in 2017, at a total cost of around $4 billion.
- Attacks involving cryptojacking increased by 8,500 percent in 2017.
- In 2017, 5.4 billion attacks by the WannaCry virus were blocked.
- There are around 24,000 malicious mobile apps blocked every day.
- In 2017, the average number of breached records by country was 24,089. The nation with the most breaches annually was India with over 33k files; the US had 28.5k.
- In 2018, Under Armor reported that its “My Fitness Pal” was hacked, affecting 150 million users.
The statistics are alarming. According to cybersecurity specialists, as many as 86% of user passwords are not immune to cryptographic attacks. On top of that, a large amount of systems store identity data in plain form or protected with old encryption algorithms or cryptographic hash functions (which by the way have been compromised within the last dozen years or so).
Analysts have also demonstrated that 21% of society has been using the same passwords for 10 years, and 47% for 5 years… That’s a serious problem, as the brute force methods are gaining in force and speed. It has also turned out that in case of as many as 73% accounts, the identity recognition in different services is duplicated. It means that cracking one password might give access to many accounts of a particular user in different online services. Some people use variations of a particular password, which in cryptoanalytical terms is also dangerous. It’s convenient for the users though – after all, it allows them to log into the e-mail, website, portal, specialized services, bank, office, doctor, messengers, social media,… and many more. How “convenient”!
Over 41 GB worth of passwords were leaked in 2017, which means about 1,500,000,000 of data. Therefore, 69% of data-leak related incidents were tied to identity theft.
Passwar. Now what?
Protection of identity and authentication in global services, including the area of IoT, has to be impregnable. It can be achieved by designing a blockchain that is optimized with this type of information flow in mind. We already have mathematical proofs now of existence of methods of encrypting, hashing data in a cryptographically safe way. Utilizing this in blockchain is not a futuristic solution. It’s around the corner.
There’s an ongoing arms race – let’s make it simpler by calling it passwar. This galloping race in successful password and data encryption takes place on the web. And the battle will we fought over a high stake: all the cryptographic solutions based on public and private keys will be breached upon the arrival of full-fledged quantum machines (it has been mathematically proven). According to IBM, quantum computers will enter mass use just 5 years from now! The light in the darkness here are the symmetrical block ciphers and the blockchain technology.
10 years ago, Symantec, IBM and others have developed the multi-factor authentication standard. We use it today in many solutions. Another important protection will be an identity authentication process based on a blockchain network.
This solution will resemble placing a protective layer on the famous network communication protocol of TCP/IP and PKI, additionally supported by a protocol of encrypted data exchange between web users, nodes and master nodes.
The purposes of the new web will be to connect people and machines in a shared safe communication. Plenty of companies in the automotive, logistic, manufacturing, financial or even governmental industries will be able to support themselves with the technology shared. Thanks to authenticating identity on the new web, the user data will be impossible to intercept. Meanwhile, in many offices, banks, scientific and public institutions, a confirmation of an important transaction, event or change is usually recorded on a piece of paper or a centralized server. In a blockchain network, such record will be available everywhere, but in a way that splits into millions of tiny pieces. Its cryptogram will be immune to cryptographic attacks, including post-quantum algorithms.
Everything is a computer these daysBruce Schneier
Everything will be connected to the Internet and as long as it’s powered, it will be online.Mikko Hypponen, cybersecurity expert
Military Grade Encryption
A hybrid blockchain is a collection of elements that strengthen safe communication using the blockchain technology. It’s an additional layer of protection that supports a safe communication protocol that supports the best data encryption standards referred to as Military Grade Encryption, or Advanced Encryption Standard with a 256 bit key that is immune to post-quantum alghoritms. And it’s worth noting that using a quantum computer allows to solve any cryptographic algorithm.The new net will support private and public side blockchains (Sidechain). Such solution ensures protecting impregnability in individual chains and blocks of data.
The algorithm for finding solutions to the search problem using a quantum computer finds a solution with a much smaller number of steps than a classical computer. For example, if we have a password consisting of 6 characters, the number of which is equal to 50, then on a classic computer we would need to check 50^6=15625000000 possible passwords, whereas on a quantum computer only approximately 50^3=125000 iterations are needed to find the correct password.
By creating new web, we want to make it easier for the society to migrate their identities, transactions or to create modern decentralized applications based on the idea of hybrid blockchains, as well as support in the IoT and AR/VR technologies. Our priority is the solution economy, stability and globalization.Piotr Powszuk, Futuresalt LTD.
BLOCKCHAIN – which means what?
Satoshi Nakamoto has created a cryptography-based protocol that isn’t a cryptocurrency in itself but a register of data also called a block chain. The first implementation of blockchain was the bitcoin currency (BTC), the implementation of which was in a way a result of the economical and financial recession that became most severe in America in 2008. Creation of BTC was also an act of rebellion against unethical conduct by financial institutions and market regulators. Everyone started contemplating once again the non-material nature of today’s money or the legitimacy of central banks, which are the money issuers. Bitcoin is a currency based on an accounting system and its register is publicly available, unlike the fiat money. Blockchain plays a much bigger role, as it opens plenty of possibilities of development for many branches of industry around the world, i.e. a blockchain might store trade contracts, important documents, agreements, and all of it takes place in a system based on a consensus that is guaranteed and maintained by a society organized around a blockchain solution and manages the register all at once. That way, it is impossible to commit a fraud.