A Few Thoughts on Cryptographic Engineering: The network is hostile
Sourced through Scoop.it from: blog.cryptographyengineering.com
“The first rule of Internet security is that there is no Internet security. Indeed, this assumption is baked into the design of the Internet and most packet-switched networks — systems where unknown third parties are responsible for handling and routing your data. There is no way to ensure that your packets will be routed as you want them, and there’s absolutely no way to ensure that they won’t be looked at.”…”you had to provide your own security between the endpoints themselves.”
This is still very much true. Products must have strong end-to-end encryption built in from start to protect their users. And more importantly, it must be hidden from the users to fiddle and misconfigure. It must be implemented in such a way that the users are protected from harming themselves, making it easier to do right than to do wrong.
See on Scoop.it – Secure communication
The post A Few Thoughts on Cryptographic Engineering: The network is hostile appeared first on Apptimate.
Source: Apptimate
A Few Thoughts on Cryptographic Engineering: The network is hostile