Article Image
News Link • Surveillance

10 Building blocks for securing the internet for the "Global Police State"

During his keynote speech at RSA Conference 2011, Microsoft's corporate VP for trustworthy computing Scott Charney called for a more cooperative approach to securing computer endpoints. The proposal is a natural maturation of Microsoft's (my full-time employer) End-to-End Trust initiative to make the internet significantly safer as a whole. It closely follows the plans I have been recommending for years; I have even written a whitepaper on the subject. The most important point of this argument is that we could, today, make the internet a much safer place to compute. All the open-standard protocols required to significantly decrease malicious attackers and malware already exist. What is missing is the leadership and involvement from the politicians, organisations, and tech experts necessary to turn the vision into a reality. Several protocols already in existence could serve as a foundation for a more secure internet, which I will discuss in greater detail. They include: Trusted Platform Module (TPM) IP version 6 (IPv6) Domain Name System Security Extensions (DNSSEC) Security Assertion Markup Language (SAML) OpenID Open Authorisation (oAuth) Multifactor authentication WS-Security protocols Interface for Metadata Access Points (IF-MAP) Application-level security

Join us on our Social Networks:


Share this page with your friends on your favorite social network:

Purse.IO Save on All Amazon Purchases