SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
April 2024
Chris Swan
Engineer
chris@atsign.com
Privacy with
Personal Data
Services
Consumers Want Privacy & Superior Experiences
2
2
Facebook
Friends
Pictures
Videos
Email
Password
Phone number
Personal posts
Google
Search history
Shopping History
Pictures
Videos
Phone number
Email
Password
LinkedIn
Business contacts
Resume
Work history
References
Email
Password
Phone number
Business Posts
Citibank
Checking balance
Savings balance
Investments
Email
Password
Phone number
Verification
questions
Mint
Assets
Checking data
Investments
Savings
Transactions
Email
Password
Amazon
Shopping history
Friends wish
lists
Email
Password
United
Flights
Email
Password
Phone number
Hilton
Hotel history
Email
Password
Phone number eBay
Purchases
Items sold
Credit card
Phone number
Password
Best Buy
Credit card
Type of computer
Computer
accessories
Appliances
Email
Password
Why does
everyone have my
data?
How do I control
this?
Why do I have to
keep entering the
same data again
and again?
Where’s my
password?
Why am I being
followed?
How did they
know I went
there?
3
Framework for E2E encrypted Apps
Apps/Data
Surveillance
Apps/Data/
Surveillance
Centralized/Siloed
Architecture
Apps/Data/
Surveillance
Their data
atProtocol: decentralized &
E2E encrypted
Data
Apps
● True end-to-end encryption
● Personas & Polymorphism
● Shared libraries & data
Update
my data
Data
Apps
Oh look,
Alice
moved!
Alice
app
Bob’s
app
Data about stuff
Alice and Bob each have public and private keys
Alice
app
Bob’s
app
Data about stuff
Public keys need to be exchanged
Alice
app
Bob’s
app
Data about stuff
Introduce personal data stores
Alice
app
Bob’s
app
Data about stuff
Alice
PDS
Bob
PDS
This helps us manage key exchange
Alice
app
Bob’s
app
Data about stuff
Alice
PDS
Bob
PDS
Share different data with different people
Alice
app
Bob’s
app
Data about stuff
Alice
PDS
Bob
PDS
Charlie’s
app
Charlie
PDS
Different data about stuff
Safer & Simpler
• End-to-end encryption
(keys at the edge)
• Fully decentralized
• Devices can cut their own keys
@ alice
Mobile Servers
@ corporation
IoT Device
@ sensor_1
atDirectory
Atsigns
Atsign confidential
@sam1994
@myinstapot02
@samswasher88
@robseclass
@jimmysjeep
@weld192
@weld193
@samsapp1
@samsapp3
@hampton_pad
@glucose_mon5
@sj1_hq
@moo_cow12
2033 - 100 Billion Atsigns
noports.com
atDirectory
Linux machine
Client
No Ports Open
linux_mc
SSH SSH
TCP Rendezvous Server
(RS)
Atsign provides several
regional rendezvous points
rendezvous
outbound
client
outbound
outbound
outbound
Atsign
Control Plane
Transport
Plane
The client which
initiates SSH
outbound
NoPorts is based on Atsign’s
Networking 2.0 Technology
● More secure
● Easy to implement
● Lower overall cost
Services
atProtocol SDKs Directory Optional Hosting
Technology
Use Cases
Safe access into a company
Safe device connection
Safe data exchange with partners
Networking
1.0
Networking
2.0
Comparison
Pro Con
Much more secure
Well Understood
Much easier to
administer
Much less cost
Insecure
Expensive
New Approach
Hard to Administer
IoT Global
Awards
WINNER
2023
IoT Security
Champion
AWARD
WINNER
2022
Future
Digital Awards
FIRST
PLACE
2022
Company Highlights
TMCnet
Cybersecurity
Excellence
WINNER
2023
World
Future Awards
TOP 100
2023
Cloud
Computing
Product of
the Year
2024
1 patent - 5 claims accepted
33 more patent claims pending
Successfully pen tested
Open source
Next generation security
Award Winning Technology
Article
Written By Xose Perez, Rakwireless
“ After all this complexity, there's good news: there is indeed a secure, remote,
and straightforward way to achieve this!
Atsign is a globally distributed company offering networking tools. One of its
projects is SSH No Ports, a connectivity solution with some unique features:
● A directory server (atDirectory) replaces ever-changing IPs with simple,
unique device names known as atSigns.
● The tunnels are only active as needed, with the device primarily waiting for
a request that the directory server has previously validated.
● A rendezvous point (Socket Rendezvous or SR) opens two single-use
sockets, creating isolated secure tunnels from the client to the device.
● Two initial tunnels connect both machines to the rendezvous server upon
request. The keys used for these tunnels are single-use and generated
on-the-fly.
This entire process adheres to a Zero Trust Policy, securing your data
end-to-end with keys stored only on your device and your client.”

Mais conteúdo relacionado

Semelhante a LNETM - Atsign - Privacy with Personal Data Services

AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
TransUnion
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
James Sutter
 

Semelhante a LNETM - Atsign - Privacy with Personal Data Services (20)

Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
AWS IoT Innovators Event: Dirk Didascalou Presentation
AWS IoT Innovators Event: Dirk Didascalou PresentationAWS IoT Innovators Event: Dirk Didascalou Presentation
AWS IoT Innovators Event: Dirk Didascalou Presentation
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerO365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
How to Integrate Blockchain Technology into Your Applications
How to Integrate Blockchain Technology into Your ApplicationsHow to Integrate Blockchain Technology into Your Applications
How to Integrate Blockchain Technology into Your Applications
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Developing Trusted Networks with Salesforce Blockchain
Developing Trusted Networks with Salesforce BlockchainDeveloping Trusted Networks with Salesforce Blockchain
Developing Trusted Networks with Salesforce Blockchain
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 

Mais de Chris Swan

Mais de Chris Swan (20)

SOOCon24 - Showing that you care about security - OpenSSF Scorecards
SOOCon24 - Showing that you care about security - OpenSSF ScorecardsSOOCon24 - Showing that you care about security - OpenSSF Scorecards
SOOCon24 - Showing that you care about security - OpenSSF Scorecards
 
All Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdf
All Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdfAll Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdf
All Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdf
 
Fluttercon Berlin 23 - Dart & Flutter on RISC-V
Fluttercon Berlin 23 - Dart & Flutter on RISC-VFluttercon Berlin 23 - Dart & Flutter on RISC-V
Fluttercon Berlin 23 - Dart & Flutter on RISC-V
 
QConNY 2023 - Implementing OSSF Scorecards Across an Organisation
QConNY 2023 - Implementing OSSF Scorecards Across an OrganisationQConNY 2023 - Implementing OSSF Scorecards Across an Organisation
QConNY 2023 - Implementing OSSF Scorecards Across an Organisation
 
Flutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and Flutter
Flutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and FlutterFlutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and Flutter
Flutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and Flutter
 
QConSF 2022 - Backends in Dart
QConSF 2022 - Backends in DartQConSF 2022 - Backends in Dart
QConSF 2022 - Backends in Dart
 
London IoT Meetup Sep 2022 - End to end encrypted IoT
London IoT Meetup Sep 2022 - End to end encrypted IoTLondon IoT Meetup Sep 2022 - End to end encrypted IoT
London IoT Meetup Sep 2022 - End to end encrypted IoT
 
Flutter Vikings 2022 - End to end IoT with Dart and Flutter
Flutter Vikings 2022 - End to end IoT with Dart and FlutterFlutter Vikings 2022 - End to end IoT with Dart and Flutter
Flutter Vikings 2022 - End to end IoT with Dart and Flutter
 
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
 
Devoxx UK 2022 - Application security: What should the attack landscape look ...
Devoxx UK 2022 - Application security: What should the attack landscape look ...Devoxx UK 2022 - Application security: What should the attack landscape look ...
Devoxx UK 2022 - Application security: What should the attack landscape look ...
 
Flutter Festival London 2022 - End to end IoT with Dart and Flutter
Flutter Festival London 2022 - End to end IoT with Dart and FlutterFlutter Festival London 2022 - End to end IoT with Dart and Flutter
Flutter Festival London 2022 - End to end IoT with Dart and Flutter
 
Full Stack Squared 2022 - Power of Open Source
Full Stack Squared 2022   - Power of Open SourceFull Stack Squared 2022   - Power of Open Source
Full Stack Squared 2022 - Power of Open Source
 
Flutter Vikings 2022 - Full Stack Dart
Flutter Vikings 2022  - Full Stack DartFlutter Vikings 2022  - Full Stack Dart
Flutter Vikings 2022 - Full Stack Dart
 
Droidcon London 2021 - Full Stack Dart
Droidcon London 2021   - Full Stack DartDroidcon London 2021   - Full Stack Dart
Droidcon London 2021 - Full Stack Dart
 
Keeping a project going
Keeping a project goingKeeping a project going
Keeping a project going
 
Dart on Arm - Flutter Bangalore June 2021
Dart on Arm - Flutter Bangalore June 2021Dart on Arm - Flutter Bangalore June 2021
Dart on Arm - Flutter Bangalore June 2021
 
TMS9995 on RC2014
TMS9995 on RC2014TMS9995 on RC2014
TMS9995 on RC2014
 
CloudCamp London Nov 2019 Intro
CloudCamp London Nov 2019 IntroCloudCamp London Nov 2019 Intro
CloudCamp London Nov 2019 Intro
 
DevSecOps Days London - Teaching 'Shift Left on Security'
DevSecOps Days London - Teaching 'Shift Left on Security'DevSecOps Days London - Teaching 'Shift Left on Security'
DevSecOps Days London - Teaching 'Shift Left on Security'
 
Cooking with a touch of science and a dash of engineering
Cooking with a touch of science and a dash of engineeringCooking with a touch of science and a dash of engineering
Cooking with a touch of science and a dash of engineering
 

Último

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Último (20)

ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 

LNETM - Atsign - Privacy with Personal Data Services

  • 2. Consumers Want Privacy & Superior Experiences 2 2 Facebook Friends Pictures Videos Email Password Phone number Personal posts Google Search history Shopping History Pictures Videos Phone number Email Password LinkedIn Business contacts Resume Work history References Email Password Phone number Business Posts Citibank Checking balance Savings balance Investments Email Password Phone number Verification questions Mint Assets Checking data Investments Savings Transactions Email Password Amazon Shopping history Friends wish lists Email Password United Flights Email Password Phone number Hilton Hotel history Email Password Phone number eBay Purchases Items sold Credit card Phone number Password Best Buy Credit card Type of computer Computer accessories Appliances Email Password Why does everyone have my data? How do I control this? Why do I have to keep entering the same data again and again? Where’s my password? Why am I being followed? How did they know I went there?
  • 3. 3 Framework for E2E encrypted Apps Apps/Data Surveillance Apps/Data/ Surveillance Centralized/Siloed Architecture Apps/Data/ Surveillance Their data atProtocol: decentralized & E2E encrypted Data Apps ● True end-to-end encryption ● Personas & Polymorphism ● Shared libraries & data Update my data Data Apps Oh look, Alice moved!
  • 5. Alice and Bob each have public and private keys Alice app Bob’s app Data about stuff
  • 6. Public keys need to be exchanged Alice app Bob’s app Data about stuff
  • 7. Introduce personal data stores Alice app Bob’s app Data about stuff Alice PDS Bob PDS
  • 8. This helps us manage key exchange Alice app Bob’s app Data about stuff Alice PDS Bob PDS
  • 9. Share different data with different people Alice app Bob’s app Data about stuff Alice PDS Bob PDS Charlie’s app Charlie PDS Different data about stuff
  • 10. Safer & Simpler • End-to-end encryption (keys at the edge) • Fully decentralized • Devices can cut their own keys @ alice Mobile Servers @ corporation IoT Device @ sensor_1 atDirectory Atsigns
  • 12. noports.com atDirectory Linux machine Client No Ports Open linux_mc SSH SSH TCP Rendezvous Server (RS) Atsign provides several regional rendezvous points rendezvous outbound client outbound outbound outbound Atsign Control Plane Transport Plane The client which initiates SSH outbound
  • 13. NoPorts is based on Atsign’s Networking 2.0 Technology ● More secure ● Easy to implement ● Lower overall cost Services atProtocol SDKs Directory Optional Hosting Technology
  • 14. Use Cases Safe access into a company Safe device connection Safe data exchange with partners
  • 15. Networking 1.0 Networking 2.0 Comparison Pro Con Much more secure Well Understood Much easier to administer Much less cost Insecure Expensive New Approach Hard to Administer
  • 16. IoT Global Awards WINNER 2023 IoT Security Champion AWARD WINNER 2022 Future Digital Awards FIRST PLACE 2022 Company Highlights TMCnet Cybersecurity Excellence WINNER 2023 World Future Awards TOP 100 2023 Cloud Computing Product of the Year 2024 1 patent - 5 claims accepted 33 more patent claims pending Successfully pen tested Open source Next generation security Award Winning Technology
  • 17. Article Written By Xose Perez, Rakwireless “ After all this complexity, there's good news: there is indeed a secure, remote, and straightforward way to achieve this! Atsign is a globally distributed company offering networking tools. One of its projects is SSH No Ports, a connectivity solution with some unique features: ● A directory server (atDirectory) replaces ever-changing IPs with simple, unique device names known as atSigns. ● The tunnels are only active as needed, with the device primarily waiting for a request that the directory server has previously validated. ● A rendezvous point (Socket Rendezvous or SR) opens two single-use sockets, creating isolated secure tunnels from the client to the device. ● Two initial tunnels connect both machines to the rendezvous server upon request. The keys used for these tunnels are single-use and generated on-the-fly. This entire process adheres to a Zero Trust Policy, securing your data end-to-end with keys stored only on your device and your client.”