Talking about safety from the currency and the "stolen"

Talking about safety from the currency and the "stolen"

UOC avanna

One pot

When a security incident occurs, the shabu-shabu is an excellent excuse for hackers. It is very "romantic."

Selling VPN services will always be serious, saying that it will never keep any records;

Apple, FB, all promised, will not reveal user privacy;

Cloud service providers, always hammering the promise, the customer's data security, I will protect it… I have no luck.

In any case, seeing the hackers who are not the best are the best "back pots."

2. Who is the hacker?

Kevin Mitnick, known as the "number one computer hacker" in the world, but his technology is not the best, and his ideas are often criticized by some peers.

The Art of Deception is one of his works.

The book elaborates on one point: "If you steal your information or banknotes, it is a hacker. Then, the scope of "hackers" includes the trustee you trust."

Misunderstanding 1: Hacker without your password

Many people think that the encrypted data is safe before it reveals the password.

In fact, this is not true.

In a battle between the red and the blue, the Red side has two legions, and the Blue side has only one legion.

However, the Blue side does not require the red-encrypted communication password, but it can use the base station to forge the communication identity of the two Red Army and provide communication services for the Red Army.

Then, winning or losing is easy to predict.

Four. Think more

Do you think "Apple" has the ability to fake a love mad ID?

Do you think the "telegram" has the ability to fake a TG account?

Do you think MT.Gox has the ability to fake a non-existent hacker?

Of course, big companies such as Apple, Telegraph and MT.Gox will never falsify user identities, and they will not create hackers. It will be unethical to infringe on the interests of users.

Although, this malicious act is very difficult to be investigated and evidenced.

V. Self-defense weapons

However, if large enterprises are unable to provide protection for user information data for some reason.

So where do users go from here?

Only pick up the weapons of mathematics.

What is Snowden using?

It is recommended to learn about the technical implementation of Bitmessage or Safeemail.

The former is used by Snowden to convey confidential information and is called "the safest communication tool in the world" by the US Department of Defense.

The latter is based on the new network underlying communication protocol SDTP, and is called "the best and safest communication tool in the world" by the technology executives of the world's largest firewall company.

Both are decentralized, and no one can control the communication pipeline;

Both are based on an identity system rather than an account password system.

This is a very core foundation. Identity cannot be forged by the rights center (that is, it cannot be impersonated), nor can it be denied service by the rights center (that is, the account cannot be deleted).

Only when this core foundation is established, it makes sense to talk about data encryption.

Two grandchildren, no matter how big they are, are not the Buddha (center) who says that it is true and which is true, so it cannot be forged.

7. Misunderstanding 2: Open source and full open source

Both Bitmessage and Safeemail are completely open source on github.

The reason for using the word "complete open source" is also very helpless.

The telegram, also known as open source, but its control center procedures and code is not open source, retaining its right to delete accounts and forgery.

Misunderstanding 3: Point-to-point is very safe

In addition, not all "peer-to-peer" means safe. It is very dangerous for those who help the matchmaking.

Note: Bitmessage and Safeemail are not peer-to-peer, they are discrete.

9. Your last protector

Technology is always confusing, keep in mind: "All the people who pat the chest, say your message, I will help you to ensure safety," you must keep one more eye.

The last thing you can believe is the mathematical mechanism of uncontrolled people.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

The data is good for the stock market of the sudden market: Which is the liquidity of the exchange?

This paper analyzes and compares the liquidity of major exchanges on April Fool's Day. In the short time from 12...

Blockchain

Simultaneously addressing the pressing issues of DEX and CEX, the company received a $ 40 million investment from Sequoia and Intel

Starkware, an Israeli startup, believes that it can solve two of the most pressing issues in crypto trading-the inher...

Blockchain

Hong Kong's anti-acquisition new deal will take effect, and the "coin stock" of the fire currency will be renamed as a risk

Tongcheng Holdings Co., Ltd. (HK1611) issued an announcement proposing to change the company name to Firecoin Technol...

Blockchain

Yesterday, 340,000 ETH on the Upbit exchange was stolen, but this server was attacked ...

Author: Chengdu chain security According to industry media reports, around 1 pm on November 27, the security system o...

Blockchain

2019 Spot Exchange Research Report: The total global trading volume is $ 13.8 trillion, BTC accounts for 48.29%

Key takeaways: 1. The annual spot transaction volume was US $ 13.8 trillion . 2. BTC's annual trading volume acc...

Blockchain

Korean or Korean? Bittrex Dreams New York

In June 2015, the New York Financial Services Department (NYDFS) became the first pioneer to develop a regulatory fra...