[LEDE-DEV] Project proposal: The GNUnet of autonomous Things

carlo von lynX lynX at time.to.get.psyced.org
Wed Nov 23 00:44:01 PST 2016


On Fri, Nov 18, 2016 at 01:30:37PM +0100, Hauke Mehrtens wrote:
> This sounds interesting.

Yes, Daniel.. keep up that good work you are doing!

> 3. What would be the difference to for example IoTvity, openHAB and
> other existing solutions?

Haven't seen an answer from Daniel and maybe you find
this "answer" from our website interesting anyhow. Our
project is called secushare. We design a distributed
social network on top of GNUnet and see IoT as one of
its potential applications:

	IT-Security and the Distributed Social Graph

	We currently accept that all Internet appliances need to listen for traffic on certain ports, interact using certain protocols and may have code vulnerabilities welcoming an attacker to gain control. But why on Earth should my printer accept connections from anywhere on the planet if only me and my colleagues are supposed to print on it?

	The distributed private social graph can be the next generation of firewall logic: only the cryptographic keys that my secushare instance gave to the printer are enabled to talk to the printer. Other network traffic doesn't even get close to it. People who need access are cryptographically authenticated without a hassle, because the social graph already provides for all the necessary information.

	No reason for traditional firewall technology to take wild guesses on which traffic may be legitimate to let through. With the social graph in place the firewall simply lets traffic of known people pass and blocks strangers.

	Who wants an insecure Internet of Things?

	No reason for the Internet of Things to be remote controlled from a website in the cloud. Like a bluetooth device they could learn the cryptographic identity of their owner at the press of a button, and from there, be controllable and configurable to offer services to the entire family or company staff.

	secushare makes people the gatekeepers to their technology. It turns them into real owners of the devices they bought.

	It's that simple, and it could spell a revolution for the entire information technology security business. Maybe IT security will never be the same after the introduction of pervasive cryptographic authentication and the availability of a distributed social graph. Did we mention that pervasive social authentication also removes the need for passwords? Passwords are among the biggest vulnerabilities in IT security.

You can find more on the topic at
	http://secushare.cheettyiapsyciew.onion
	or http://secushare.org
if you can afford to browse the net naked.


-- 
  E-mail is public! Talk to me in private using encryption:
         http://loupsycedyglgamf.onion/LynX/
          irc://loupsycedyglgamf.onion:67/lynX
         https://psyced.org:34443/LynX/



More information about the Lede-dev mailing list