cesium 起火

On July 15, 2020, Twitter Inc. suffered a cyberattack during which three Florida teenagers took control of several high-profile Twitter accounts, including those of Joe Biden, Barack Obama, Elon Musk and Bill Gates. The teenagers were able to gain such high-profile access by carrying out a social engineering scheme against one of Twitter’s employees.

2020年7月15日,Twitter Inc. 遭受网络攻击,在此期间,三名佛罗里达州青少年控制了几个备受瞩目的Twitter帐户,包括Joe Biden,Barack Obama,Elon Musk和Bill Gates的帐户。 通过对Twitter的一名员工实施一项社会工程计划,这些少年能够获得如此高调的访问权限。

Software currently used to build large-scale online software was designed in a different era and for an entirely different threat model.

当前用于构建大规模在线软件的软件是在不同的时代针对完全不同的威胁模型设计的。

While this particular attack was promoting a cryptocurrency scam, a similar one just as easily could have been used to cause social unrest or even start a war, if the attackers targeted one of the world’s political leaders.

尽管这种特殊攻击正在促进一种加密货币骗局,但如果攻击者瞄准了世界上一位政治领导人,那么类似的攻击就很容易被用来引发社会动荡甚至发动战争。

Software currently used to build large-scale online software was designed in a different era and for an entirely different threat model. It is because of this that our collective information security is coming apart at the seams, as new threats are emerging every day. This constitutes a real crisis that can only be addressed through radical innovation.

当前用于构建大规模在线软件的软件是在不同的时代针对完全不同的威胁模型设计的。 正因为如此,随着每天都出现新的威胁,我们的集体信息安全正在四分五裂。 这构成了真正的危机,只有通过彻底的创新才能解决。

The innovation that can deliver the solution to this problem is the emerging field of containerized secure software development infrastructure. Such an infrastructure can serve to both increase the degree of data security, and to make it more transparent, enabling us to make educated choices related to our use of global information technology.

可以为该问题提供解决方案的创新是容器化安全软件开发基础结构的新兴领域。 这样的基础架构既可以提高数据安全性,又可以使其更加透明,从而使我们能够做出与使用全球信息技术相关的明智选择。

(重新)定义数据安全性 ((Re)Defining data security)

To the majority of us, the term “information security” evokes hacking, two-factor authentication, and the Equifax data breach. This view, however, is too narrow, and the issues at hand are far more complex and nuanced. First, proliferation of corrupt, unverifiable, an un-deletable data drains our ability to ensure safety from political and social meddling; second, high-security software is currently so hard to use, that it becomes all but inaccessible to ordinary users; third, companies such as Twitter still have the “god mode” — operator privileges that enable attackers to cause almost unlimited damage; fourth, it is not possible for users to reliably ascertain the degree of reliability of the information with which they interact, preventing coordination and collaboration. All of these are real concerns that currently fall outside of the traditional approaches to information security.

对于我们大多数人来说,“信息安全”一词会引起黑客攻击,两因素身份验证和Equifax数据泄露。 但是,这种观点过于狭,,眼下的问题更加复杂和细微。 首先,腐败,无法核实,无法删除的数据的扩散耗尽了我们确保免受政治和社会干预的安全的能力; 其次,高安全性软件目前很难使用,普通用户几乎无法使用它。 第三,Twitter等公司仍然拥有“上帝模式”,即操作员特权,使攻击者能够造成几乎无限的破坏; 第四,用户不可能可靠地确定与其交互的信息的可靠性程度,从而无法协调和协作。 所有这些都是真正的关注点,目前不在传统的信息安全方法之列。

As the Cambridge Analytica scandal demonstrates, the most damaging abuses don’t involve hacking. While Facebook provides ostensible account-level security, it lacks the bigger-picture protections, such as the “do-not-forward” tagging of information or secure data deletion. As a result, Facebook was able to grant access to its user data to someone who should never have had that access. It is not relevant whether this was done by malice or by negligence: it shouldn’t have been possible at all.

正如Cambridge Analytica丑闻所表明的那样,最具破坏性的滥用行为与黑客无关。 尽管Facebook提供了表面上的帐户级别的安全性,但它缺乏更大范围的保护,例如信息的“请勿转发”标记或安全的数据删除。 结果,Facebook能够将其用户数据的访问权限授予不应有该访问权限的人。 这是恶意还是疏忽都无关紧要:这根本不可能。

W

w ^

Or take the Hillary Clinton email scandal. A busy presidential candidate, she was supposed to spend part of her overbooked schedule logging into her government-provided email account that only worked on the laptop and required a hard-to-use second-factor dongle. What Clinton did was what any of us would do: when faced with the inconvenience of maintaining a high degree of digital security, she switched to using her personal email, because it was fast and convenient. That account was subsequently hacked. Clinton’s high security email account was not insecure in the traditional sense, but because it was difficult to use, the outcome was just the same as if it were.

或参加希拉里·克林顿(Hillary Clinton)电子邮件丑闻。 作为一位忙碌的总统候选人,她本应将超出预定的时间表的一部分用于登录政府提供的电子邮件帐户,该帐户只能在笔记本电脑上工作,并且需要难以使用的第二因素加密狗。 克林顿所做的就是我们每个人都会做的事情:面对维护高度数字安全的不便之处,她转而使用个人电子邮件,因为它既快速又方便。 该帐户随后遭到黑客入侵。 克林顿的高安全性电子邮件帐户在传统意义上并不是不安全的,但是由于它难以使用,因此结果就好像是一样。

Or consider the fact that deep-fake videos and pictures are now reaching the new level of quality and accessibility. What is to prevent images of fake porn, fake murders, fake police brutality from causing social and political damage? We are seeing the emergence of a brand new kind of warfare, the one one in which malicious data can be used as a weapon on the global scale.

或考虑一下事实,即虚假视频和图片现在已达到质量和可访问性的新水平。 如何防止假色情,假谋杀,假警察暴行的图像造成社会和政治损失? 我们正在看到一种全新的战争,一种可以将恶意数据用作全球规模武器的战争。

Here is how one can solve the problem of deep fakes: digital camera and smartphone manufacturers can include cryptographic chips into their devices. Such chips can securely sign every image taken, and the signature can later be used for verification. This is just one illustration of how the holistic approach to security works: it must be applied to every device out there, or it won’t work.

这是解决伪造品问题的方法:数码相机和智能手机制造商可以在其设备中包含加密芯片。 这样的芯片可以安全地对拍摄的每张图像进行签名,并且签名以后可以用于验证。 这只是整体安全方法工作方式的一个例证:必须将其应用于那里的每台设备,否则将无法工作。

需要新方法 (The need for a new approach)

To begin addressing the global security crisis, we must build systems that fulfill several novel security requirements. First, security can no longer exclude the user. If the system is cumbersome to use, it must be treated as insecure. The future software systems must be good at creating complex user-centric workflows that make them appropriate for general use.

要开始解决全球安全危机,我们必须构建满足几个新安全要求的系统。 首先,安全性不能再排除用户。 如果系统使用起来很麻烦,则必须将其视为不安全的系统。 未来的软件系统必须善于创建复杂的以用户为中心的工作流程,使其适合于一般用途。

Second, security can no longer be thought of in the context of each component independently of others. All too often a system with a high degree of security sends sensitive data to a mere shell script. All data must be protected in all places it visits, and the new generation of secure software must enable such multi-node, multi-agent analysis.

其次,在每个组件的上下文中不再能够独立考虑安全性。 通常,具有高度安全性的系统会将敏感数据发送到纯Shell脚本。 所有数据都必须在其访问的所有位置得到保护,并且新一代安全软件必须启用这种多节点,多代理分析。

Even the most trustworthy and reliable operators can be compromised.

即使是最值得信赖和最可靠的运营商也会受到损害。

Third, the new generation of systems must enable users to independently verify the security of the entire software stack, in a striking contrast with the current architectures that provide no transparency beyond the web-server. (Footnote: the lack of holistic software-stack-wide protection is a problem even in decentralized blockchain systems. Example: the hacks of individual accounts carried out by compromising the internet DNS infrastructure)

第三,新一代系统必须使用户能够独立验证整个软件堆栈的安全性,这与当前的架构形成了鲜明的对比。 (注:即使在分散的区块链系统中,缺乏整体软件堆栈范围的保护也是一个问题。例如:通过破坏互联网DNS基础设施对个人帐户进行黑客攻击)

Fourth, we must learn to build systems without the “god mode.” Even the most trustworthy and reliable operators can be compromised. The “god mode” makes it possible for the attackers to cause unlimited damage, which is no longer acceptable. A truly secure system must instead have auditable and verifiable business rules defining the operator role.

第四,我们必须学会构建没有“上帝模式”的系统。 即使是最值得信赖和最可靠的运营商也会受到损害。 “神模式”使攻击者有可能造成无限损失,这已不再是可以接受的。 相反,真正安全的系统必须具有定义操作员角色的可审核和可验证的业务规则。

Fifth and finally, it is critical to acknowledge that all software, almost without exception, must be treated as secure software. Building secure software must be easy and inexpensive. We can no longer afford the view that security is a narrow and specialized field.

第五,最后,至关重要的一点是,必须将所有软件几乎毫无例外地视为安全软件。 构建安全软件必须简单且便宜。 我们再也不能认为安全是一个狭窄而专业的领域。

None of this is possible with the current tools, which is why we need to build new ones. This type of innovation has happened many times before, at critical junctures when the existing approach to software engineering became unsuitable for the new usage patterns. We did this back when machine code became too complex for people to understand, and compilers were invented. Then again, when bare metal software became untenable and operating systems were created.

当前的工具无法实现所有这些,这就是为什么我们需要构建新的工具。 当现有软件工程方法变得不适用于新的使用模式时,这种创新已经在关键时刻发生了很多次。 当机器代码变得太复杂以至于人们无法理解并且发明了编译器时,我们就这样做了。 再者,当裸机软件变得站不住脚并创建操作系统时。

Docker is an interesting recent example of this kind of innovation. Difficulties of package management caused a persistent low-degree drain on engineers’ attention and diminished the overall system reliability. Docker was the difference between 99.8% reliability and 99.9999% reliability. This might not seem like a big difference, but when the cloud became the prevalent deployment modality, this meant that companies could dramatically increase the number of nodes they operated, without the decrease in reliability.

Docker是这种创新的有趣例子。 软件包管理的困难导致工程师的注意力持续低落,并降低了整体系统的可靠性。 Docker是99.8%可靠性和99.9999%可靠性之间的差异。 这似乎没有太大的区别,但是当云成为流行的部署方式时,这意味着公司可以在不降低可靠性的情况下大大增加其运营的节点数量。

Something similar must now happen in secure software development. The new approach we take must be similar to Docker in its approach to component isolation, standardization, complexity management, and fault reduction. Two recent advances lead to our emerging ability to do so: trust technology and containerized programming models.

现在,安全软件开发中必须发生类似的事情。 我们采用的新方法在组件隔离,标准化,复杂性管理和故障减少方面必须与Docker类似。 最近的两项进步使我们有能力做到这一点:信任技术和容器化编程模型。

Trust technology enables an agent to trust a remote piece of software that the agent doesn’t control. It enables multi-system security analysis and transitive security, without which the new level of internet security is impossible. Trust technology is now widely available in the form of TEEs, hardware components that serve as the security layer around critical software. It is hard to underestimate the importance of this technology.

信任技术使代理能够信任该代理无法控制的远程软件。 它支持多系统安全性分析和可传递安全性,没有它们,互联网安全的新水平是不可能的。 如今,信任技术以TEE的形式广泛可用,TEE 是用作关键软件安全层的硬件组件 。 很难低估这项技术的重要性。

Containerized programming technology provides a way to develop secure business logic in the context of trust containers, such as TEEs. It is worth the effort to understand and to examine containerized programming systems at length, because they are both so new, and so important to solving the data security crisis.

容器化编程技术提供了一种在信任容器(例如TEE)的上下文中开发安全业务逻辑的方法。 值得深入理解和研究容器化的编程系统,因为它们既新又对解决数据安全危机至关重要。

Adopting the new paradigm

采用新范式

Containerized programming frameworks shift the emphasis from expressive power to ease of analysis and verification.

容器化的编程框架将重点从表达能力转移到易于分析和验证。

A containerized programming infrastructure is the “docker” of secure programming. It is a set of tools for development and deployment of secure software that is standardized, analysable, and specifically designed to manage complexity. It uses an approach very different from the traditional approach to software development, because it is designed to reduce, not increase, the spectrum of programming possibilities. It simplifies security analysis of complex software by turning to dry and restrictive programming models and by designing a new generation of communication protocols appropriate for multi-agent software analysis.

容器化的编程基础架构是安全编程的“码头工人”。 它是用于开发和部署安全软件的一组工具,这些工具是标准化,可分析的,并且专门设计用于管理复杂性。 它使用的方法与传统的软件开发方法非常不同,因为它旨在减少而不是增加编程可能性的范围。 通过使用干式和限制性编程模型,并设计适用于多代理软件分析的新一代通信协议,它简化了复杂软件的安全性分析。

Containerized programming frameworks shift the emphasis from expressive power to ease of analysis and verification. This comes at a necessary cost. Software designed for holistic security typically comes with new programming languages and specialized processes, introducing a steep learning curve for developers. But to learn these models is time well spent, because it leads to systems achieving an entirely new level of security guarantees.

容器化的编程框架将重点从表达能力转移到易于分析和验证。 这需要一定的成本。 专为整体安全性而设计的软件通常带有新的编程语言和专门的流程,从而为开发人员带来了陡峭的学习曲线。 但是学习这些模型花费了很多时间,因为它导致系统达到全新的安全保证水平。

Here are some examples of containerized software frameworks currently being built.

这是当前正在构建的容器化软件框架的一些示例。

  • Haja Networks, a Finland-based startup is developing a highly advanced and holistically-secure framework based on the Ambients Calculus and Total Functional Programming. It is clever, and fits the profile exactly. It has all the hallmarks of security-enabling software for the next millennium in terms of multi-component analysis and complexity management. (UPD: apparently the latest on Haja is that the team has moved to a different company and is now developing a similar product under a different umbrella.)

    Haja网络 ,一个芬兰的启动是开发基于环境温度是微积分和总函数式编程非常先进和全面地安全框架。 它很聪明,并且完全适合该配置文件。 就多组件分析和复杂性管理而言,它具有下一个千年的安全支持软件的所有标志。 (UPD:显然,关于Haja的最新消息是,该团队已移至另一家公司,并且正在另一伞下开发类似产品。)

  • Urbit, a San Francisco-based startup founded in early 2000s by Curtis Yarvin, a controversial computer scientist, who has designed, and his team has implemented, an incredibly clever containerized software stack entirely from scratch. Rather than relying on existing academic work, Yarvin designed his own primitive computation calculus he called Nock, which operates on binary trees. Urbit is a fascinating project with a bright potential to address some insidious security concerns of existing consumer internet software.

    Urbit是一家总部位于旧金山的创业公司,由有争议的计算机科学家Curtis Yarvin于2000年代初创立,他设计并由他的团队实施了一个极其聪明的容器化软件堆栈,完全是从头开始的。 Yarvin不再依赖现有的学术工作,而是设计了自己的原始计算演算(称为Nock),该演算在二叉树上运行。 Urbit是一个引人入胜的项目,具有巨大的潜力,可以解决现有消费者互联网软件的一些隐患。

  • My own project, ADAPT, is being built as a system for rapid development of secure enterprise and mobile data-management components. Its primary goal is to offer companies a possibility of a deep security upgrade, by rewriting small critical components using the new framework. ADAPT will enable secure data containerization across a broad spectrum of environments: secure enclaves, browser add-ons, and IoT software.

    我自己的项目ADAPT正在构建为快速开发安全企业和移动数据管理组件的系统。 其主要目标是通过使用新框架重写小的关键组件,为公司提供深度安全升级的可能性。 ADAPT将在广泛的环境中实现安全的数据容器化:安全的飞地,浏览器插件和IoT软件。

If this work is not prioritized, everyone’s safety and wellbeing will become increasingly endangered by both mistakes and malicious cyber-activity on the rise globally.

如果不优先进行这项工作,那么全球范围内错误和恶意网络活动将使每个人的安全和福祉日益受到威胁。

All three of these projects are offering something radically new and advanced. Much like Docker, whose usefulness only became obvious in retrospect, containerized secure programming systems will seem like a no-brainer in the next ten years. To enable safe use of data at the modern scale, a shift must take place, marked by an increased understanding that we can no longer approach security as a matter isolated to a single software component, or exclude the user from our security reasoning.

所有这三个项目都提供了全新的高级功能。 就像Docker,其用途只是在回顾中才变得显而易见,在接下来的十年中,容器化的安全编程系统似乎毫无疑问。 为了在现代规模上安全地使用数据,必须进行转变,其特征是人们越来越了解到,我们不能再将安全性视为孤立于单个软件组件的问题,也不能将用户排除在安全性推理之外。

This shift has already begun, and it will serve to ensure safety of users and indeed anyone in the world by guaranteeing that systems we use to communicate with one another, to share information, and coordinate critical activity are suitably secure for their purposes. If this work is not prioritized, everyone’s safety and wellbeing will become increasingly endangered by both mistakes and malicious cyber-activity on the rise globally.

这一转变已经开始,它将通过确保我们用来互相通信,共享信息和协调关键活动的系统对于他们的目的而言是适当安全的,从而确保用户以及世界上所有人的安全。 如果不优先进行这项工作,那么全球范围内错误和恶意网络活动将使每个人的安全和福祉日益受到威胁。

This article does not constitute endorsement or investment advise. Special thanks to Katia Rossi for editing help.

本文不构成背书或投资建议。 特别感谢 Katia Rossi 提供的编辑帮助。

翻译自: https://medium.com/swlh/digital-house-on-fire-ad2e9b714bc0

cesium 起火


http://www.taodudu.cc/news/show-4421628.html

相关文章:

  • 下载谷歌play应用_在Google Play控制台上为应用设置发布并发布到内部曲目
  • 高级加密标准 (AES) 和安全断言标记语言 (SAML) 的 Web 安全
  • “为物联网提供分散的隐私保护医疗区块链”外文翻译——2019年5月份
  • L4 U5 欢迎
  • 【翻译】Sencha Touch 2入门:创建一个实用的天气应用程序之三
  • 非对称加密 公钥解密_了解非对称公钥加密
  • 如何在嵌入式 Linux 和物联网中建立信任根
  • 德州扑克实践之三-----比较大小
  • 使用ML.NET实现德州扑克牌型分类器
  • 计算6+德州扑克各个牌型的概率
  • 普通人都能看懂的德州扑克-python版
  • 收集的各个方向的开发视频教程,分享给自学的同学
  • 下载安装使用Canal
  • 静态综合试验
  • 【论文阅读】RoadMap: A Light-Weight Semantic Map for Visual Localization towards Autonomous Driving
  • 大数据生态圈简介
  • linux驱动 设备驱动模型
  • 【嵌入式开发】 Linux Kernel 下载 配置 编译 安装 及 驱动简介
  • WinCE流驱动基础知识小结
  • u-boot (1) —— 编译分析
  • QEMU代码详解
  • 关于证书,这里有你想知道的一切
  • 【最终总结版】linux内核编译过程
  • 如何参与linux内核开发
  • uboot调试总结(freescale平台为例)
  • turbo linux系统光盘,TurboLinux系统启动软盘的创建方法(转)
  • windriver下pcmcia驱动程序编写的疑问
  • 从零开始之驱动发开、linux驱动(二十三、platform总线之数据驱动分离)
  • 2.4.XXX 内核配置 介绍
  • U-Boot是什么

cesium 起火_数字房子着火了相关推荐

  1. 专题_数字货币历史行情获取[博]

    原创博客地址:专题_数字货币历史行情获取[博] 1,购买 1.1 淘宝,闲鱼 1.2 matrix 地址:https://jiaozi-matrix.com/ 1.3 cryptocompare有免费 ...

  2. CCC3.0学习笔记_数字密钥数据结构

    CCC3.0学习笔记_数字密钥数据结构 系列文章目录 文章目录 系列文章目录 前言 4.1 Applet Instance Layout 4.2 Digital Key Structure 4.2.1 ...

  3. cesium广告牌_公路广告牌

    cesium广告牌 Description: 描述: This is a standard dynamic programing problem of finding maximum profits ...

  4. python输入数字是什么类型的游戏_“数字炸弹”——一个练习Python基础知识的小游戏...

    数字"炸弹" 数字炸弹小游戏,平时可以多个人一块玩.游戏规则也很简单:从0~100之间选一个数字,作为"炸弹".每人轮流猜,数字的范围不断缩小,直到有人&quo ...

  5. c++字符数组整数转换中文大写金额的形式_数字大写转换烦,内置格式多缺陷, VBA函数来解难...

    观看视频更直观 在Excel中将数字转换为中文大写或小写,有两种方法,一种是设置数据格式:另一种是使用内置的隐蔽函数NumberString函数. 一.设置数据格式 在Excel中输入数字后,选中单元 ...

  6. java数字常量_数字常量 - javawebsoa - 博客园

    数字常量 shell脚本在默认情况下都是把数字作为10进制数来处理, 除非这个数字采用了特殊的标记或者前缀. 如果数字以0开头的话那么就是8进制数. 如果数字以0x开头的话那么就是16进制数. 如果数 ...

  7. python复数的实部和虚部都是整数嘛_数字类型

    Python数字数据类型用于储存数值. 数字类型是不可变类型,所谓不可变类型,指的是类型的值一旦有不同了,那么他就是一个全新的对象,数字1和2分别代表两个不同的对象,对变量重新赋值一个数字类型,会新创 ...

  8. 手机取证技巧之微信迁移取证_数字取证技巧和窍门:«您的电话»应用取证

    手机取证技巧之微信迁移取证 Announcing Windows 10 Insider Preview Build 18999 including an update for «Your Phone» ...

  9. cesium 车流_基于Cesium的城市三维可视化地下管线系统的建立方法与流程

    本发明属于虚拟三维管线领域,特别是涉及基于Cesium的城市三维可视化地下管线系统的建立方法. 背景技术: 随着我国经济的快速发展,城市规模也在不断地扩大,而城市地下管网的铺设力度也不断加大,城市地下 ...

最新文章

  1. 如何将注册中心从 Consul 平滑的迁移到 Nacos ?
  2. 结巴分词jieba添加自定义词典
  3. This XML file does not appear to have any style information associated with it. The document tree is
  4. eclipse配置PHP自动提示代码
  5. 八皇后问题判断此位置是否需合适
  6. Java内存模型(二)
  7. IDEA下Maven多模块项目介绍和搭建
  8. 【C语言】学习笔记6——const
  9. 教你一招,自己就能检测mac
  10. 拓端tecdat|R语言分布滞后非线性模型(DLNM)研究发病率,死亡率和空气污染示例
  11. 数据库系统概论第五版(第 3 章 关系数据库标准语言SQL)笔记
  12. 服务器显示器超频,电脑显示器超频怎么恢复正常 电脑显示器超频是什么原因...
  13. ShuffleNet神经网络
  14. ITF Demo代码(用VBScript构建的接口测试框架)
  15. 做SEO优化的目的到底是什么
  16. sharding-jdbc系列之常见问题(十四)
  17. 11.ARM架构的异常与中断
  18. Artemis资源限制(17)
  19. 计算机考研网课平台哪个好,考研网课哪家排名好
  20. 前端食堂技术周刊第 53 期:React Router 6.4、VS Code August 2022、2022 Google 谷歌开发者大会、Meta 开源 MemLab、Vue.js 技术内幕

热门文章

  1. pgsql-修改默认密码
  2. java.sql.SQLException: ORA-00918: 未明确定义列ORA-00918
  3. 小程序源码:自适应来电模拟器
  4. 6大科研神器,科研党必备,至少提高效率90%
  5. Python——验证码输入
  6. Python基础详解(十四):2022-Pycharm最新版社区版安装教程
  7. bit Byte bps Bps
  8. C/C++——vector的基本操作总结
  9. 20120814-虚拟串口VSPD的使用方法
  10. 虚拟串口工具VSPD简单使用