A Few Thoughts on Cryptographic Engineering: The network is hostile
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
1855
post-template-default,single,single-post,postid-1855,single-format-standard,stockholm-core-2.4.5,select-child-theme-ver-1.0.0,select-theme-ver-9.12,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-7.9,vc_responsive

A Few Thoughts on Cryptographic Engineering: The network is hostile

Sourced through Scoop.it from: blog.cryptographyengineering.com

“The first rule of Internet security is that there is no Internet security. Indeed, this assumption is baked into the design of the Internet and most packet-switched networks — systems where unknown third parties are responsible for handling and routing your data. There is no way to ensure that your packets will be routed as you want them, and there’s absolutely no way to ensure that they won’t be looked at.”…”you had to provide your own security between the endpoints themselves.”
This is still very much true. Products must have strong end-to-end encryption built in from start to protect their users. And more importantly, it must be hidden from the users to fiddle and misconfigure. It must be implemented in such a way that the users are protected from harming themselves, making it easier to do right than to do wrong.

See on Scoop.itSecure communication

The post A Few Thoughts on Cryptographic Engineering: The network is hostile appeared first on Apptimate.


Source: Apptimate
A Few Thoughts on Cryptographic Engineering: The network is hostile