SlideShare uma empresa Scribd logo
1 de 62
Baixar para ler offline
The edge of the Internet is
becoming the center
Stewart Mackenzie
Revuln 19q4
OR
The age of the datacenter draws to a close
Structure of the talk
1. Where we’re going.
2. What’s the problem?
3. The road to Internet centralisation
a. Putting down the wires
b. Packet switching
c. Information centric
4. Copernica
a. Anonymous
b. Decentralised
c. State level threat actor
5. Conclusion
Where we’re going.
● The edge of the Internet is becoming the center
Where we’re going.
● The edge of the Internet is becoming the center
● The truth is currently at the center
Where we’re going.
● The edge of the Internet is becoming the center
● The truth is currently at the center
● Data has no provenance
Where we’re going.
● The edge of the Internet is becoming the center
● The truth is currently at the center
● Data has no provenance
● GAFAM exploits user’s data without consent to make money
Where we’re going.
● The edge of the Internet is becoming the center
● The truth is currently at the center
● Data has no provenance
● GAFAM exploits user’s data without consent to make money
● Host-centric networking creates monopolies
Where we’re going.
● The edge of the Internet is becoming the center
● The truth is currently at the center
● Data has no provenance
● GAFAM exploits user’s data without consent to make money
● Host-centric networking creates monopolies
● Centralised monopolies are ripe for exploit by state level threat actors
Where we’re going.
● The edge of the Internet is becoming the center
● The truth is currently at the center
● Data has no provenance
● GAFAM exploits user’s data without consent to make money
● Host-centric networking creates monopolies
● Centralised monopolies are ripe for exploit by state level threat actors
● Fake news is a result of the center unable to control the edge
Where we’re going.
● The edge of the Internet is becoming the center
● The truth is currently at the center
● Data has no provenance
● GAFAM exploits user’s data without consent to make money
● Host-centric networking creates monopolies
● Centralised monopolies are ripe for exploit by state level threat actors
● Fake news is a result of the center unable to control the edge
● Edge AI controlled by GAFAM will constantly listen to your voice building
psychological models.
Where we’re going.
● The edge of the Internet is becoming the center
● The truth is currently at the center
● Data has no provenance
● GAFAM exploits user’s data without consent to make money
● Host-centric networking creates monopolies
● Centralised monopolies are ripe for exploit by state level threat actors
● Fake news is a result of the center unable to control the edge
● Edge AI controlled by GAFAM will constantly listen to your voice building
psychological models.
This is just symptomatic behaviour of a deeper cause
The core problems
The core problems
● Centralisation of the Internet
The core problems
● Centralisation of the Internet
● Data isn’t secured at the source and has no provenance
The road to Internet centralisation
The road to Internet centralisation
● Phase 1 - putting down the wires for the telephone systems
The road to Internet centralisation
● Phase 1 - putting down the wires for the telephone systems
● Problems:
○ Intrinsic addresses
The road to Internet centralisation
● Intrinsic addresses
The road to Internet centralisation
● Phase 1 - putting down the wires for the telephone systems
● Problems:
○ Intrinsic addresses
○ Reliability of connections
The road to Internet centralisation
● Reliability of connections
The road to Internet centralisation
● Reliability of connections
Rf = Connection Reliability Factor
Cpf = Component Failure Probability
Cn = Number of components in connection (count every wire, knob switch etc!)
Rf = Cfp * Cn
The road to Internet centralisation
● Phase 1 - putting down the wires for the telephone systems
● Problems:
○ Intrinsic addresses
○ Reliability of connections
○ Very slow connection setup times
The road to Internet centralisation
● Very slow connection setup times
Later
The road to Internet centralisation
● Phase 1 - putting down the wires for the telephone systems
● Problems:
○ Intrinsic addresses
○ Reliability of connections
○ Very slow connection setup times
○ Topology was critical due to reliability issues
The road to Internet centralisation
● Phase 1 - putting down the wires for the telephone systems
● Problems:
○ Intrinsic addresses
○ Reliability of connections
○ Very slow connection setup times
○ Topology was critical due to reliability issues
○ Telecom monopolies
The road to Internet centralisation
● Phase 1 - putting down the wires for the telephone systems
● Problems:
○ Intrinsic addresses
○ Reliability of connections
○ Very slow connection setup times
○ Topology was critical due to reliability issues
○ Telecom monopolies
● Solution:
○ Wires are put down - the backbone is formed
The road to Internet centralisation
● Phase 2 - The Internet as we know it or Packet Switching or End Points
● Solutions
○ Intrinsic addresses
The road to Internet centralisation
● Intrinsic addresses
The road to Internet centralisation
● Intrinsic addresses
The road to Internet centralisation
● Phase 2 - The Internet as we know it or Packet Switching or End Points
● Solutions
○ Intrinsic addresses
○ Connection setup times disappeared totally as you’re always connected
The road to Internet centralisation
● Phase 2 - The Internet as we know it or Packet Switching or End Points
● Solutions
○ Intrinsic addresses
○ Connection setup times disappeared totally as you’re always connected
○ Combinatorics of failure flipped on its head, more nodes less probability of failure
The road to Internet centralisation
● Phase 2 - The Internet as we know it or Packet Switching or End Points
● Solutions
○ Intrinsic addresses
○ Connection setup times disappeared totally as you’re always connected
○ Combinatorics of failure flipped on its head, more nodes less probability of failure
● Problems
○ GAFAM - data dissemination monopolies AND telecom monopolies
The road to Internet centralisation
● Phase 2 - The Internet as we know it or Packet Switching or End Points
● Solutions
○ Intrinsic addresses
○ Connection setup times disappeared totally as you’re always connected
○ Combinatorics of failure flipped on its head, more nodes less probability of failure
● Problems
○ GAFAM - data dissemination monopolies AND telecom monopolies
○ Content dissemination over host-centric networking is insanely expensive
The road to Internet centralisation
● Phase 2 - The Internet as we know it or Packet Switching or End Points
● Solutions
○ Intrinsic addresses
○ Connection setup times disappeared totally as you’re always connected
○ Combinatorics of failure flipped on its head, more nodes less probability of failure
● Problems
○ GAFAM - data dissemination monopolies AND telecom monopolies
○ Content dissemination over host-centric networking is insanely expensive
○ Edge AI deployed constantly monitors your digital actions building psychological profiles
phoning home to GAFAM clouds.
The road to Internet centralisation
● Phase 2 - The Internet as we know it or Packet Switching or End Points
● Solutions
○ Intrinsic addresses
○ Connection setup times disappeared totally as you’re always connected
○ Combinatorics of failure flipped on its head, more nodes less probability of failure
● Problems
○ GAFAM - data dissemination monopolies AND telecom monopolies
○ Content dissemination over host-centric networking is insanely expensive
○ Edge AI deployed constantly monitors your digital actions building psychological profiles
phoning home to GAFAM clouds.
○ Data has no provenance and isn’t secure
We’re at a fork now
Path A: Continue using the centralised Internet
● As the edge is growing exponentially, GAFAM can’t keep up
● GAFAM desperate to control the edge will use edge AI to monitor, surveil, profile
then curate edge data independently to be sent home to GAFAM servers later.
● Of course this AI will be packaged as some digital assistant like Siri on Apple, it’s
even reaching into developing countries via feature phones and Google Assistant
on KaiOS - Google paid 22 mill USD to get GA + Gapps on KaiOS.
● This path isn’t possible in the long run because of data dissemination over a
host-centric network costs a lot.
● Edge processing power and storage capacity will dwarf GAFAM centralised servers
Path B: Start growing a decentralised Internet
We’re at a fork now
Information-centric network, the natural progression of the Internet
● Solutions
○ Centralisation of the Internet
We’re at a fork now
Information-centric network, the natural progression of the Internet
● Solutions
○ Centralisation of the Internet
○ Secure signed data (provenance of data) with optional encryption
We’re at a fork now
Information-centric network, the natural progression of the Internet
● Solutions
○ Centralisation of the Internet
○ Secure signed data (provenance of data) with optional encryption
Enter Copernica
We’re at a fork now
Copernica
Named after Copernicus, who realised the Earth isn’t the center of the Universe just as the
IP host isn’t the center of networking, instead the Sun or Named Data should be the center
of the networking world.
Copernica
● Free software / Open source using MPLv2 License (you own your contributions)
Copernica
● Implemented in the Rust programming language
Copernica
● Free software / Open source using MPLv2 License
● Implemented in the Rust programming language
● Overlay on UDP, as every box on the current Internet supports UDP.
● Aspires to use raw (no IP) broadcast over Wifi 5G connecting Hong Kong homes
together.
Copernica Objectives
● Be a viable secure networking protocol for the a new content-centric Internet that
actively promotes decentralisation
Copernica Hard Design Constraints
● Routing information must be anonymous with no addressing information
● Must not make use of global knowledge (trusted third parties are security holes)
● The threat actor for this network is a highly organised wealthy totalitarian
government
What is Copernica’s Secret Sauce?
Copernica - Secret Sauce is Sparse Distributed Representation
Each interface has a 2048 bit vector where F = False, T = True
F F F F F F F F F F F F F F F F
F F F F F F F F F F F F F F F F
F F F F F F F F F F F F F F F F
F F F F F F F F F F F F F F F F
F F F F F F F F F F F F F F F F
F F F F F F F F F F F F F F F ...
Copernica - Secret Sauce is Sparse Distributed Representation
You as the publisher of data need to convert the name of your data into a Sparse
Distributed Representation Index (SDRI):
“My-Excel-Document.xls” => 10, 45, 67
F F F F F F F F F F T F F F F F
F F F F F F F F F F F F F F F F
F F F F F F F F F F F F F T F F
F F F F F F F F F F F F F F F F
F F F T F F F F F F F F F F F F
F F F F F F F F F F F F F F F ...
Copernica - Secret Sauce is Sparse Distributed Representation
“My-Excel-Document.xls” => 10, 45, 67
So how do we do the conversion in a deterministic manner such that different parties
can arrive at the same result?
Every data name consists of two components: your unique id + the data name
Copernica - Secret Sauce is Sparse Distributed Representation
Your unique ID looks like this:
ceo1q0te4aj3u2llwl4mxuxnjm9skj897hncanvgcnz0gf3x57ap6h7gk4dw8nv
Your data name looks like this:
“my-excel-file.xls”
The ID is a Bech32 address derived from Ed25519 (Edwards-curve Digital Signature
Algorithm)
“ceo1q0te4aj3u2llwl4mxuxnjm9skj897hncanvgcnz0gf3x57ap6h7gk4dw8nv::my-excel-file.xls”
Copernica - Secret Sauce is Sparse Distributed Representation
Next we take the below name and pass it through a SHA3_512 hashing algorithm:
SHA3_512(“ceo1q0te4aj3u2llwl4mxuxnjm9skj897hncanvgcnz0gf3x57ap6h7gk4dw8nv”)
=>
768ade3da083187a1028dccea3fe7e738c76be4c2ef3fd54bfcfd63f67b34fd588698057a3165b941bbe77355541120c793
3efc854ffea0dbb80fcfd7f068a4c
Copernica - Secret Sauce is Sparse Distributed Representation
We then calculate the positions of the least frequent occurring character in the hash
lowest_occurring_character(“768ade3da083187a1028dccea3fe7e738c76be4c2ef3fd54bfcfd63f67b34fd588698057a
3165b941bbe77355541120c7933efc854ffea0dbb80fcfd7f068a4c”)
=>
[(18, "2"), (40, "2"), (93, "2")]
The number 2 occurs in positions 18, 40 and 93
Copernica - Secret Sauce is Sparse Distributed Representation
We then calculate the bit position of each character using this algorithm
768ade3da083187a1028dccea3fe7e738c76be4c2ef3fd54bfcfd63f67b34fd588698057a3165b941bbe77355541120c793
3efc854ffea0dbb80fcfd7f068a4c
2048_bitvector_position = position_in_hash * 16 + decimal(hexadecimal_character)
[(18, "2"), (40, "2"), (93, "2")]
[290 <= 18 * 16 + 2, 642 <= 40 * 16 + 2, 1490 <= 93 * 16 + 2]
=>
[290, 642, 1490]
Copernica - Secret Sauce is Sparse Distributed Representation
We then calculate the bit position for the ID and ID+DATA_NAME
[2048_bitvector_position(“ceo1q0te4aj3u2l...57ap6h7gk4dw8nv”),
2048_bitvector_position(“ceo1q0te4aj3u2l...57ap6h7gk4dw8nv::my-excel-file.xls”)]
=>
This is our SDRI, a unique anonymous identifier of information.
[[290, 642, 1490][17, 481, 593]]
Copernica - Secret Sauce is Sparse Distributed Representation
[[290, 642, 1490][17, 481, 593]] [[351, 573, 2031][21, 373, 351]]
F F F F F F F F F F F F F F F F
F F T F F F F F F F F F F F F F
F F F F F F T F F F T F F F F F
F F F F F F F F F F F F F F F F
F F F F T F F F F F F F T F F F
F F F F F T F F F F F F F T F ...
Copernica Packet Structure - Simple Request/Response Model
struct Sdri {
id: Vec<u16>,
name: Vec<u16>,
}
enum Packet {
Request { sdri: Sdri },
Response { sdri: Sdri, data: Data },
}
Copernica Packet Structure - Simple Request/Response Model
If a state threat actor intercepts a Request Packet all they’ll see is:
[[290, 642, 1490], [17, 481, 593]]
If a state threat actor intercepts a Response Packet all they’ll see is:
[[[290, 642, 1490], [17, 481, 593]]
[EnCt2d5f14f76c5e5c3d6d5c6be14487c509ad5702bc0d5f14f76c5e5c3d6d5c6be14I+vuDw9yVgG0HbBR7l28RJT
VIhIIIBPIQK1x+OOxOZpCrlQFWClEI/9mNC8/LYxvOowGYEmPN3IYlwgoZpk/4ub5YJEbpeYg8LdkHGUfsL
yqedNTSKTFe4+tvRfc3wi5oroltf32CVkIlQ==IwEmS]]
Copernica
This type of communications can traverse over insecure channels, it can go into the
NSA, Huawei and come out again and they will have an extremely hard time extracting
information from this.
[[[290, 642, 1490], [17, 481, 593]]
[EnCt2d5f14f76c5e5c3d6d5c6be14487c509ad5702bc0d5f14f76c5e5c3d6d5c6be14I+vuDw9yVgG0HbBR7l28RJT
VIhIIIBPIQK1x+OOxOZpCrlQFWClEI/9mNC8/LYxvOowGYEmPN3IYlwgoZpk/4ub5YJEbpeYg8LdkHGUfsL
yqedNTSKTFe4+tvRfc3wi5oroltf32CVkIlQ==IwEmS]]
You can put the above data on a usb drive, stick it in your sock, walk across the North
Korean border and this data can be copied everywhere.
Copernica
● No Global Routing Information
○ No Single Point of Failure
● Totally Anonymous
● Mandatory Signing of Data to prove Provenance
○ Unsigned data isn’t moved on the network
● Encryption by default, opt-out for non-encrypted packets
● Very easy to build Web of Trust
● Totally Decentralised / Distributed
○ Breaking the backbone of data dissemination monopolies
Conclusion
As the edge of the Internet is becoming the new center, GAFAM and totalitarian
governments are going to have an increasingly hard time controlling the edge from the
centre. Fake News is but a symptom of this loss of control in combination with
untrusted data. Unsigned information is mis-information.
Specialist AI in tracking, monitoring and reporting will curate edge data on your
machines and phone home to GAFAM clouds. If GAFAM built your phone is that AI
malware?
Copernica let’s you own your own data and trust others. CCP will not be able to
control this network.
Stewart Mackenzie - sjm@fractalide.com

Mais conteúdo relacionado

Semelhante a Stewart MACKENZIE - The edge of the Internet is becoming the center

IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 BlockchainHub Graz
 
Broad Sky March 2018 SD-WAN presentation
Broad Sky  March 2018 SD-WAN presentationBroad Sky  March 2018 SD-WAN presentation
Broad Sky March 2018 SD-WAN presentationMaureen Donovan
 
Broad Sky SD-WAN September 2018
Broad Sky SD-WAN September 2018Broad Sky SD-WAN September 2018
Broad Sky SD-WAN September 2018Maureen Donovan
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6FRSecure
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networksSabarishSanjeevi
 
When DevOps and Networking Intersect by Brent Salisbury of socketplane.io
When DevOps and Networking Intersect by Brent Salisbury of socketplane.ioWhen DevOps and Networking Intersect by Brent Salisbury of socketplane.io
When DevOps and Networking Intersect by Brent Salisbury of socketplane.ioDevOps4Networks
 
Get Connected Minehead 05.04
Get Connected Minehead 05.04Get Connected Minehead 05.04
Get Connected Minehead 05.04Get up to Speed
 
The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the NetworkTom Paseka
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
Maidsafe presentation
Maidsafe presentationMaidsafe presentation
Maidsafe presentationDirk Hoving
 
OSMC 2019 | Hot Potato by James Forman
OSMC 2019 | Hot Potato by James FormanOSMC 2019 | Hot Potato by James Forman
OSMC 2019 | Hot Potato by James FormanNETWAYS
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Rui Miguel Feio
 
SEA IGF 2021: Some thoughts on Internet infrastructure
SEA IGF 2021: Some thoughts on Internet infrastructure SEA IGF 2021: Some thoughts on Internet infrastructure
SEA IGF 2021: Some thoughts on Internet infrastructure APNIC
 
Harnessing The Cloud
Harnessing The CloudHarnessing The Cloud
Harnessing The Cloudguest7130f30
 

Semelhante a Stewart MACKENZIE - The edge of the Internet is becoming the center (20)

IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5
 
Broad Sky March 2018 SD-WAN presentation
Broad Sky  March 2018 SD-WAN presentationBroad Sky  March 2018 SD-WAN presentation
Broad Sky March 2018 SD-WAN presentation
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Broad Sky SD-WAN September 2018
Broad Sky SD-WAN September 2018Broad Sky SD-WAN September 2018
Broad Sky SD-WAN September 2018
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
When DevOps and Networking Intersect by Brent Salisbury of socketplane.io
When DevOps and Networking Intersect by Brent Salisbury of socketplane.ioWhen DevOps and Networking Intersect by Brent Salisbury of socketplane.io
When DevOps and Networking Intersect by Brent Salisbury of socketplane.io
 
Routing Security Considerations
Routing Security ConsiderationsRouting Security Considerations
Routing Security Considerations
 
Get Connected Minehead 05.04
Get Connected Minehead 05.04Get Connected Minehead 05.04
Get Connected Minehead 05.04
 
The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the Network
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Maidsafe presentation
Maidsafe presentationMaidsafe presentation
Maidsafe presentation
 
OSMC 2019 | Hot Potato by James Forman
OSMC 2019 | Hot Potato by James FormanOSMC 2019 | Hot Potato by James Forman
OSMC 2019 | Hot Potato by James Forman
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
Gaurab Ixp Tutorial
Gaurab Ixp TutorialGaurab Ixp Tutorial
Gaurab Ixp Tutorial
 
SEA IGF 2021: Some thoughts on Internet infrastructure
SEA IGF 2021: Some thoughts on Internet infrastructure SEA IGF 2021: Some thoughts on Internet infrastructure
SEA IGF 2021: Some thoughts on Internet infrastructure
 
WEEK-01.pdf
WEEK-01.pdfWEEK-01.pdf
WEEK-01.pdf
 
Harnessing The Cloud
Harnessing The CloudHarnessing The Cloud
Harnessing The Cloud
 

Mais de REVULN

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...REVULN
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaREVULN
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanREVULN
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...REVULN
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckREVULN
 
Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?REVULN
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...REVULN
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...REVULN
 

Mais de REVULN (12)

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact Check
 
Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
 

Último

Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...nirzagarg
 

Último (20)

Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 

Stewart MACKENZIE - The edge of the Internet is becoming the center

  • 1. The edge of the Internet is becoming the center Stewart Mackenzie Revuln 19q4 OR The age of the datacenter draws to a close
  • 2. Structure of the talk 1. Where we’re going. 2. What’s the problem? 3. The road to Internet centralisation a. Putting down the wires b. Packet switching c. Information centric 4. Copernica a. Anonymous b. Decentralised c. State level threat actor 5. Conclusion
  • 3. Where we’re going. ● The edge of the Internet is becoming the center
  • 4. Where we’re going. ● The edge of the Internet is becoming the center ● The truth is currently at the center
  • 5. Where we’re going. ● The edge of the Internet is becoming the center ● The truth is currently at the center ● Data has no provenance
  • 6. Where we’re going. ● The edge of the Internet is becoming the center ● The truth is currently at the center ● Data has no provenance ● GAFAM exploits user’s data without consent to make money
  • 7. Where we’re going. ● The edge of the Internet is becoming the center ● The truth is currently at the center ● Data has no provenance ● GAFAM exploits user’s data without consent to make money ● Host-centric networking creates monopolies
  • 8. Where we’re going. ● The edge of the Internet is becoming the center ● The truth is currently at the center ● Data has no provenance ● GAFAM exploits user’s data without consent to make money ● Host-centric networking creates monopolies ● Centralised monopolies are ripe for exploit by state level threat actors
  • 9. Where we’re going. ● The edge of the Internet is becoming the center ● The truth is currently at the center ● Data has no provenance ● GAFAM exploits user’s data without consent to make money ● Host-centric networking creates monopolies ● Centralised monopolies are ripe for exploit by state level threat actors ● Fake news is a result of the center unable to control the edge
  • 10. Where we’re going. ● The edge of the Internet is becoming the center ● The truth is currently at the center ● Data has no provenance ● GAFAM exploits user’s data without consent to make money ● Host-centric networking creates monopolies ● Centralised monopolies are ripe for exploit by state level threat actors ● Fake news is a result of the center unable to control the edge ● Edge AI controlled by GAFAM will constantly listen to your voice building psychological models.
  • 11. Where we’re going. ● The edge of the Internet is becoming the center ● The truth is currently at the center ● Data has no provenance ● GAFAM exploits user’s data without consent to make money ● Host-centric networking creates monopolies ● Centralised monopolies are ripe for exploit by state level threat actors ● Fake news is a result of the center unable to control the edge ● Edge AI controlled by GAFAM will constantly listen to your voice building psychological models. This is just symptomatic behaviour of a deeper cause
  • 13. The core problems ● Centralisation of the Internet
  • 14. The core problems ● Centralisation of the Internet ● Data isn’t secured at the source and has no provenance
  • 15. The road to Internet centralisation
  • 16. The road to Internet centralisation ● Phase 1 - putting down the wires for the telephone systems
  • 17. The road to Internet centralisation ● Phase 1 - putting down the wires for the telephone systems ● Problems: ○ Intrinsic addresses
  • 18. The road to Internet centralisation ● Intrinsic addresses
  • 19. The road to Internet centralisation ● Phase 1 - putting down the wires for the telephone systems ● Problems: ○ Intrinsic addresses ○ Reliability of connections
  • 20. The road to Internet centralisation ● Reliability of connections
  • 21. The road to Internet centralisation ● Reliability of connections Rf = Connection Reliability Factor Cpf = Component Failure Probability Cn = Number of components in connection (count every wire, knob switch etc!) Rf = Cfp * Cn
  • 22. The road to Internet centralisation ● Phase 1 - putting down the wires for the telephone systems ● Problems: ○ Intrinsic addresses ○ Reliability of connections ○ Very slow connection setup times
  • 23. The road to Internet centralisation ● Very slow connection setup times Later
  • 24. The road to Internet centralisation ● Phase 1 - putting down the wires for the telephone systems ● Problems: ○ Intrinsic addresses ○ Reliability of connections ○ Very slow connection setup times ○ Topology was critical due to reliability issues
  • 25. The road to Internet centralisation ● Phase 1 - putting down the wires for the telephone systems ● Problems: ○ Intrinsic addresses ○ Reliability of connections ○ Very slow connection setup times ○ Topology was critical due to reliability issues ○ Telecom monopolies
  • 26. The road to Internet centralisation ● Phase 1 - putting down the wires for the telephone systems ● Problems: ○ Intrinsic addresses ○ Reliability of connections ○ Very slow connection setup times ○ Topology was critical due to reliability issues ○ Telecom monopolies ● Solution: ○ Wires are put down - the backbone is formed
  • 27. The road to Internet centralisation ● Phase 2 - The Internet as we know it or Packet Switching or End Points ● Solutions ○ Intrinsic addresses
  • 28. The road to Internet centralisation ● Intrinsic addresses
  • 29. The road to Internet centralisation ● Intrinsic addresses
  • 30. The road to Internet centralisation ● Phase 2 - The Internet as we know it or Packet Switching or End Points ● Solutions ○ Intrinsic addresses ○ Connection setup times disappeared totally as you’re always connected
  • 31. The road to Internet centralisation ● Phase 2 - The Internet as we know it or Packet Switching or End Points ● Solutions ○ Intrinsic addresses ○ Connection setup times disappeared totally as you’re always connected ○ Combinatorics of failure flipped on its head, more nodes less probability of failure
  • 32. The road to Internet centralisation ● Phase 2 - The Internet as we know it or Packet Switching or End Points ● Solutions ○ Intrinsic addresses ○ Connection setup times disappeared totally as you’re always connected ○ Combinatorics of failure flipped on its head, more nodes less probability of failure ● Problems ○ GAFAM - data dissemination monopolies AND telecom monopolies
  • 33. The road to Internet centralisation ● Phase 2 - The Internet as we know it or Packet Switching or End Points ● Solutions ○ Intrinsic addresses ○ Connection setup times disappeared totally as you’re always connected ○ Combinatorics of failure flipped on its head, more nodes less probability of failure ● Problems ○ GAFAM - data dissemination monopolies AND telecom monopolies ○ Content dissemination over host-centric networking is insanely expensive
  • 34. The road to Internet centralisation ● Phase 2 - The Internet as we know it or Packet Switching or End Points ● Solutions ○ Intrinsic addresses ○ Connection setup times disappeared totally as you’re always connected ○ Combinatorics of failure flipped on its head, more nodes less probability of failure ● Problems ○ GAFAM - data dissemination monopolies AND telecom monopolies ○ Content dissemination over host-centric networking is insanely expensive ○ Edge AI deployed constantly monitors your digital actions building psychological profiles phoning home to GAFAM clouds.
  • 35. The road to Internet centralisation ● Phase 2 - The Internet as we know it or Packet Switching or End Points ● Solutions ○ Intrinsic addresses ○ Connection setup times disappeared totally as you’re always connected ○ Combinatorics of failure flipped on its head, more nodes less probability of failure ● Problems ○ GAFAM - data dissemination monopolies AND telecom monopolies ○ Content dissemination over host-centric networking is insanely expensive ○ Edge AI deployed constantly monitors your digital actions building psychological profiles phoning home to GAFAM clouds. ○ Data has no provenance and isn’t secure
  • 36. We’re at a fork now Path A: Continue using the centralised Internet ● As the edge is growing exponentially, GAFAM can’t keep up ● GAFAM desperate to control the edge will use edge AI to monitor, surveil, profile then curate edge data independently to be sent home to GAFAM servers later. ● Of course this AI will be packaged as some digital assistant like Siri on Apple, it’s even reaching into developing countries via feature phones and Google Assistant on KaiOS - Google paid 22 mill USD to get GA + Gapps on KaiOS. ● This path isn’t possible in the long run because of data dissemination over a host-centric network costs a lot. ● Edge processing power and storage capacity will dwarf GAFAM centralised servers
  • 37. Path B: Start growing a decentralised Internet We’re at a fork now
  • 38. Information-centric network, the natural progression of the Internet ● Solutions ○ Centralisation of the Internet We’re at a fork now
  • 39. Information-centric network, the natural progression of the Internet ● Solutions ○ Centralisation of the Internet ○ Secure signed data (provenance of data) with optional encryption We’re at a fork now
  • 40. Information-centric network, the natural progression of the Internet ● Solutions ○ Centralisation of the Internet ○ Secure signed data (provenance of data) with optional encryption Enter Copernica We’re at a fork now
  • 41. Copernica Named after Copernicus, who realised the Earth isn’t the center of the Universe just as the IP host isn’t the center of networking, instead the Sun or Named Data should be the center of the networking world.
  • 42. Copernica ● Free software / Open source using MPLv2 License (you own your contributions)
  • 43. Copernica ● Implemented in the Rust programming language
  • 44. Copernica ● Free software / Open source using MPLv2 License ● Implemented in the Rust programming language ● Overlay on UDP, as every box on the current Internet supports UDP. ● Aspires to use raw (no IP) broadcast over Wifi 5G connecting Hong Kong homes together.
  • 45. Copernica Objectives ● Be a viable secure networking protocol for the a new content-centric Internet that actively promotes decentralisation
  • 46. Copernica Hard Design Constraints ● Routing information must be anonymous with no addressing information ● Must not make use of global knowledge (trusted third parties are security holes) ● The threat actor for this network is a highly organised wealthy totalitarian government
  • 47. What is Copernica’s Secret Sauce?
  • 48. Copernica - Secret Sauce is Sparse Distributed Representation Each interface has a 2048 bit vector where F = False, T = True F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F ...
  • 49. Copernica - Secret Sauce is Sparse Distributed Representation You as the publisher of data need to convert the name of your data into a Sparse Distributed Representation Index (SDRI): “My-Excel-Document.xls” => 10, 45, 67 F F F F F F F F F F T F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F T F F F F F F F F F F F F F F F F F F F F F T F F F F F F F F F F F F F F F F F F F F F F F F F F F ...
  • 50. Copernica - Secret Sauce is Sparse Distributed Representation “My-Excel-Document.xls” => 10, 45, 67 So how do we do the conversion in a deterministic manner such that different parties can arrive at the same result? Every data name consists of two components: your unique id + the data name
  • 51. Copernica - Secret Sauce is Sparse Distributed Representation Your unique ID looks like this: ceo1q0te4aj3u2llwl4mxuxnjm9skj897hncanvgcnz0gf3x57ap6h7gk4dw8nv Your data name looks like this: “my-excel-file.xls” The ID is a Bech32 address derived from Ed25519 (Edwards-curve Digital Signature Algorithm) “ceo1q0te4aj3u2llwl4mxuxnjm9skj897hncanvgcnz0gf3x57ap6h7gk4dw8nv::my-excel-file.xls”
  • 52. Copernica - Secret Sauce is Sparse Distributed Representation Next we take the below name and pass it through a SHA3_512 hashing algorithm: SHA3_512(“ceo1q0te4aj3u2llwl4mxuxnjm9skj897hncanvgcnz0gf3x57ap6h7gk4dw8nv”) => 768ade3da083187a1028dccea3fe7e738c76be4c2ef3fd54bfcfd63f67b34fd588698057a3165b941bbe77355541120c793 3efc854ffea0dbb80fcfd7f068a4c
  • 53. Copernica - Secret Sauce is Sparse Distributed Representation We then calculate the positions of the least frequent occurring character in the hash lowest_occurring_character(“768ade3da083187a1028dccea3fe7e738c76be4c2ef3fd54bfcfd63f67b34fd588698057a 3165b941bbe77355541120c7933efc854ffea0dbb80fcfd7f068a4c”) => [(18, "2"), (40, "2"), (93, "2")] The number 2 occurs in positions 18, 40 and 93
  • 54. Copernica - Secret Sauce is Sparse Distributed Representation We then calculate the bit position of each character using this algorithm 768ade3da083187a1028dccea3fe7e738c76be4c2ef3fd54bfcfd63f67b34fd588698057a3165b941bbe77355541120c793 3efc854ffea0dbb80fcfd7f068a4c 2048_bitvector_position = position_in_hash * 16 + decimal(hexadecimal_character) [(18, "2"), (40, "2"), (93, "2")] [290 <= 18 * 16 + 2, 642 <= 40 * 16 + 2, 1490 <= 93 * 16 + 2] => [290, 642, 1490]
  • 55. Copernica - Secret Sauce is Sparse Distributed Representation We then calculate the bit position for the ID and ID+DATA_NAME [2048_bitvector_position(“ceo1q0te4aj3u2l...57ap6h7gk4dw8nv”), 2048_bitvector_position(“ceo1q0te4aj3u2l...57ap6h7gk4dw8nv::my-excel-file.xls”)] => This is our SDRI, a unique anonymous identifier of information. [[290, 642, 1490][17, 481, 593]]
  • 56. Copernica - Secret Sauce is Sparse Distributed Representation [[290, 642, 1490][17, 481, 593]] [[351, 573, 2031][21, 373, 351]] F F F F F F F F F F F F F F F F F F T F F F F F F F F F F F F F F F F F F F T F F F T F F F F F F F F F F F F F F F F F F F F F F F F F T F F F F F F F T F F F F F F F F T F F F F F F F T F ...
  • 57. Copernica Packet Structure - Simple Request/Response Model struct Sdri { id: Vec<u16>, name: Vec<u16>, } enum Packet { Request { sdri: Sdri }, Response { sdri: Sdri, data: Data }, }
  • 58. Copernica Packet Structure - Simple Request/Response Model If a state threat actor intercepts a Request Packet all they’ll see is: [[290, 642, 1490], [17, 481, 593]] If a state threat actor intercepts a Response Packet all they’ll see is: [[[290, 642, 1490], [17, 481, 593]] [EnCt2d5f14f76c5e5c3d6d5c6be14487c509ad5702bc0d5f14f76c5e5c3d6d5c6be14I+vuDw9yVgG0HbBR7l28RJT VIhIIIBPIQK1x+OOxOZpCrlQFWClEI/9mNC8/LYxvOowGYEmPN3IYlwgoZpk/4ub5YJEbpeYg8LdkHGUfsL yqedNTSKTFe4+tvRfc3wi5oroltf32CVkIlQ==IwEmS]]
  • 59. Copernica This type of communications can traverse over insecure channels, it can go into the NSA, Huawei and come out again and they will have an extremely hard time extracting information from this. [[[290, 642, 1490], [17, 481, 593]] [EnCt2d5f14f76c5e5c3d6d5c6be14487c509ad5702bc0d5f14f76c5e5c3d6d5c6be14I+vuDw9yVgG0HbBR7l28RJT VIhIIIBPIQK1x+OOxOZpCrlQFWClEI/9mNC8/LYxvOowGYEmPN3IYlwgoZpk/4ub5YJEbpeYg8LdkHGUfsL yqedNTSKTFe4+tvRfc3wi5oroltf32CVkIlQ==IwEmS]] You can put the above data on a usb drive, stick it in your sock, walk across the North Korean border and this data can be copied everywhere.
  • 60. Copernica ● No Global Routing Information ○ No Single Point of Failure ● Totally Anonymous ● Mandatory Signing of Data to prove Provenance ○ Unsigned data isn’t moved on the network ● Encryption by default, opt-out for non-encrypted packets ● Very easy to build Web of Trust ● Totally Decentralised / Distributed ○ Breaking the backbone of data dissemination monopolies
  • 61. Conclusion As the edge of the Internet is becoming the new center, GAFAM and totalitarian governments are going to have an increasingly hard time controlling the edge from the centre. Fake News is but a symptom of this loss of control in combination with untrusted data. Unsigned information is mis-information. Specialist AI in tracking, monitoring and reporting will curate edge data on your machines and phone home to GAFAM clouds. If GAFAM built your phone is that AI malware? Copernica let’s you own your own data and trust others. CCP will not be able to control this network.
  • 62. Stewart Mackenzie - sjm@fractalide.com