The Next 50 Years of Computer Security

Outsmart Malicious Hackers


There’s an interesting audio file about the next 50 years of computer security, it’s from a talk Alan Coxa a fellow at Red Hat Linux gave recently at the European OSCON.

It talks about the implementations of modularity, trusted computing hardware (we are already seing this in part, hardware anti-virus implementations and DRM to be built into CPUs), ‘separation of secrets,’ and overcoming the challenge of users not reading dialog boxes, will be crucial milestones as we head on to the future. He states: “As security improves, we need to keep building things which are usable, which are turned on by default, which means understanding users is the target for the next 50 years. You don’t buy a car with optional bumpers. You can have a steering wheel fitted if you like, but it comes with a spike by default.” All of this has to be shipped in a way that doesn’t stop the user from doing things.

Security and validation are critical issues in computing, and the next fifty years will be harder than the last. There are a number of proven programming techniques and design approaches which are already helping to harden our modern systems, but each of these must be carefully balanced with usability in order to be effective. In this talk, Alan Cox, fellow at Red Hat Linux, explores the future of what may be the biggest threat facing software engineers, the unverified user.

Of course security is always a balance between usability and actual security, the more secure something is, generally the less usable it becomes and vice versa, imminently usable…totally unsecure.

What else do you think is going to happen? For better or worse..

Source: IT Conversations

Posted in: Hacking News

,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


2 Responses to The Next 50 Years of Computer Security

  1. Someone May 11, 2006 at 7:33 am #

    What is going to happen over the next 50 years? General purpose computing will be less general. More appliances, one for gaming, one for media, one for communication and so on. We still have General purpose computers but their adoption in society would be less frequent.

  2. Navaho Gunleg May 14, 2006 at 1:02 pm #

    Yeah, I have to agree with Someone, there will be more different devices for specific uses.

    I also expect that, internally, these appliances shall still be general-purpose capable, so to speak. However, Digital Restriction Management and/or sneaky EULA’s (which by itself are Digital Restriction-tools, too), or too extreme ‘cyber’-laws will prevent the hackers (in the positive sense) to crack the appliances open and see how it works, to improve it or to add the functionality that we want and share the information.

    An otherwise so innocent and intellectually challenging an experience will become ‘illegal’ and make one an instant criminal. (In contrast: the whole Industrial Revolution wouldn’t have been possible if there weren’t any people tinkering with other people’s inventions, aiming to improve and secure things.)

    Heck, maybe it’ll even be impossible to open these appliances by embedding them in some type of epoxy that is impossible to remove without harning the device.

    That’s the more sadder route that events could take — future might show us we have been priviledged to live in current times…