Update Blog #2 webpage from version 4.0.0.16 to 4.1.0.23.
This commit is contained in:
parent
f984deda74
commit
0009f0a9e9
@ -5,22 +5,19 @@
|
|||||||
<!-- Copyright 2022 Jake Winters -->
|
<!-- Copyright 2022 Jake Winters -->
|
||||||
<!-- SPDX-License-Identifier: BSD-3-Clause -->
|
<!-- SPDX-License-Identifier: BSD-3-Clause -->
|
||||||
|
|
||||||
<!-- Version: 4.0.0.16 -->
|
<!-- Version: 4.1.0.23 -->
|
||||||
|
|
||||||
|
|
||||||
<html>
|
<html>
|
||||||
|
<head>
|
||||||
<head>
|
|
||||||
<title>Inferencium - Blog - Untrusted: The Issue with Decentralisation</title>
|
<title>Inferencium - Blog - Untrusted: The Issue with Decentralisation</title>
|
||||||
<link rel="stylesheet" href="../inf.css">
|
<link rel="stylesheet" href="../inf.css">
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||||
</head>
|
</head>
|
||||||
|
<!-- Navigation bar -->
|
||||||
<!-- Navigation bar. -->
|
<div class="sidebar">
|
||||||
<div class="sidebar">
|
<a href="../index.html"><img src="../asset/img/logo-inferencium-no_text.png" width="110px" height="110px"></a>
|
||||||
<img src="../asset/img/logo-inferencium-no_text.png"
|
<a href="../index.html" class="title">Inferencium</a><br>
|
||||||
width="110px" height="110px">
|
|
||||||
<a class="title">Inferencium</a><br>
|
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
<div><a href="../about.html">About</a></div>
|
<div><a href="../about.html">About</a></div>
|
||||||
@ -28,57 +25,38 @@
|
|||||||
<div><a href="../blog.html">Blog</a></div>
|
<div><a href="../blog.html">Blog</a></div>
|
||||||
<div><a href="../source.html">Source</a></div>
|
<div><a href="../source.html">Source</a></div>
|
||||||
<div><a href="../key.html">Key</a></div>
|
<div><a href="../key.html">Key</a></div>
|
||||||
</div>
|
</div>
|
||||||
|
<body>
|
||||||
<body>
|
|
||||||
<h1>Blog - #2</h1>
|
<h1>Blog - #2</h1>
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
|
|
||||||
<h2>Untrusted: The Issue with Decentralisation</h2>
|
<h2>Untrusted: The Issue with Decentralisation</h2>
|
||||||
<br>
|
|
||||||
<p class="update_date">Posted: 2022-06-30 (UTC+00:00)</p>
|
<p class="update_date">Posted: 2022-06-30 (UTC+00:00)</p>
|
||||||
<p class="update_date">Updated: 2022-10-29 (UTC+00:00)</p>
|
<p class="update_date">Updated: 2022-10-29 (UTC+00:00)</p>
|
||||||
<br>
|
<!-- Table of contents -->
|
||||||
<br>
|
<section id="toc">
|
||||||
|
<h2 id="toc"><a href="#toc" class="h2">Table of Contents<a/></h2>
|
||||||
<!-- Table of contents. -->
|
|
||||||
<h2 id="toc"><a href="#toc" class="h2"
|
|
||||||
>Table of Contents<a/></h2>
|
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="#introduction" class="body-link"
|
<li><a href="#introduction" class="body-link">Introduction</a></li>
|
||||||
>Introduction</a></li>
|
<li><a href="#examples" class="body-link">Examples</a></li>
|
||||||
<li><a href="#examples" class="body-link"
|
|
||||||
>Examples</a></li>
|
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="#examples-messaging" class="body-link"
|
<li><a href="#examples-messaging" class="body-link">Messaging</a></li>
|
||||||
>Messaging</a></li>
|
|
||||||
</ul>
|
</ul>
|
||||||
<li><a href="#solution" class="body-link"
|
<li><a href="#solution" class="body-link">Solution</a></li>
|
||||||
>Solution</a></li>
|
<li><a href="#conclusion" class="body-link">Conclusion</a></li>
|
||||||
<li><a href="#conclusion" class="body-link"
|
|
||||||
>Conclusion</a></li>
|
|
||||||
</ul>
|
</ul>
|
||||||
<br>
|
</section>
|
||||||
<br>
|
<section id="introduction">
|
||||||
<br>
|
<h2 id="introduction"><a href="#introduction" class="h2">Introduction</a></h2>
|
||||||
|
|
||||||
<h2 id="introduction"><a href="#introduction" class="h2"
|
|
||||||
>Introduction</a></h2>
|
|
||||||
<p>A recent trend is seeing people move towards decentralised services and platforms. While this is
|
<p>A recent trend is seeing people move towards decentralised services and platforms. While this is
|
||||||
reasonable and I can understand why they are doing such a thing, they are seemingly doing it without
|
reasonable and I can understand why they are doing such a thing, they are seemingly doing it without
|
||||||
thinking about the possible consequences of doing so. The issue with decentralisation is trust;
|
thinking about the possible consequences of doing so. The issue with decentralisation is trust;
|
||||||
there is no way to pin a key to a specific person, to ensure that you are communicating with the
|
there is no way to pin a key to a specific person, to ensure that you are communicating with the
|
||||||
same person you are supposed to be communicating with. In this article, I will discuss some of the
|
same person you are supposed to be communicating with. In this article, I will discuss some of the
|
||||||
security issues with the decentralised model.</p>
|
security issues with the decentralised model.</p>
|
||||||
<br>
|
</section>
|
||||||
<br>
|
<section id="examples">
|
||||||
|
<h2 id="examples"><a href="#examples" class="h2">Examples</a></h2>
|
||||||
<h2 id="examples"><a href="#examples" class="h2"
|
<section id="examples-messaging">
|
||||||
>Examples</a></h2>
|
<h3 id="examples-messaging"><a href="#examples-messaging" class="h3">Messaging</a></h3>
|
||||||
<h3 id="examples-messaging"><a href="#examples-messaging" class="h3"
|
|
||||||
>Messaging</a></h3>
|
|
||||||
<p>When it comes to messaging your contacts on a centralised platform, such as Twitter or Facebook,
|
<p>When it comes to messaging your contacts on a centralised platform, such as Twitter or Facebook,
|
||||||
the keys are pinned to that user account, using the user's password as the method of identification.
|
the keys are pinned to that user account, using the user's password as the method of identification.
|
||||||
This approach makes it impossible to log in as a specific user without their password, should it be
|
This approach makes it impossible to log in as a specific user without their password, should it be
|
||||||
@ -88,7 +66,6 @@
|
|||||||
servers, which makes the physical security trusted. As for remote security, should a user's password
|
servers, which makes the physical security trusted. As for remote security, should a user's password
|
||||||
be compromised, it can typically be reset if the user can prove they are the owner of the account
|
be compromised, it can typically be reset if the user can prove they are the owner of the account
|
||||||
via some form of identification; this is where the trust issue of decentralisation occurs.</p>
|
via some form of identification; this is where the trust issue of decentralisation occurs.</p>
|
||||||
<br>
|
|
||||||
<p>In the decentralised model, keys are kept on the users' devices, in their possession. While this
|
<p>In the decentralised model, keys are kept on the users' devices, in their possession. While this
|
||||||
soveriegnty is welcomed, it introduces a critical flaw in the security of communicating with anyone
|
soveriegnty is welcomed, it introduces a critical flaw in the security of communicating with anyone
|
||||||
via a decentralised platform; should a user's device be lost, stolen, or otherwise compromised,
|
via a decentralised platform; should a user's device be lost, stolen, or otherwise compromised,
|
||||||
@ -101,18 +78,16 @@
|
|||||||
literally no way to know if the person you are communicating with is the real person or an imposter;
|
literally no way to know if the person you are communicating with is the real person or an imposter;
|
||||||
there is no root of trust. This point is fatal; game over. The only way to establish trust again
|
there is no root of trust. This point is fatal; game over. The only way to establish trust again
|
||||||
would be to physically meet and exchange keys.</p>
|
would be to physically meet and exchange keys.</p>
|
||||||
<br>
|
</section>
|
||||||
<br>
|
</section>
|
||||||
|
<section id="solution">
|
||||||
<h2 id="solution"><a href="#solution" class="h2"
|
<h2 id="solution"><a href="#solution" class="h2">Solution</a></h2>
|
||||||
>Solution</a></h2>
|
|
||||||
<p>I'll cut to the chase; there isn't a definitive solution. The best way to handle this situation
|
<p>I'll cut to the chase; there isn't a definitive solution. The best way to handle this situation
|
||||||
is to design your threat model and think about your reasoning for avoiding centralised platforms. Is
|
is to design your threat model and think about your reasoning for avoiding centralised platforms. Is
|
||||||
it lack of trust of a specific company? Is it the possibility of centralised platforms going
|
it lack of trust of a specific company? Is it the possibility of centralised platforms going
|
||||||
offline? Only by thinking logically and tactically can you solve both the issue of centralisation
|
offline? Only by thinking logically and tactically can you solve both the issue of centralisation
|
||||||
and decentralisation. Often, one size fits all is never the correct approach, nor does it typically
|
and decentralisation. Often, one size fits all is never the correct approach, nor does it typically
|
||||||
work.</p>
|
work.</p>
|
||||||
<br>
|
|
||||||
<p>In order to avoid the issue of loss of trust due to lack of root of trust, all users' keys must
|
<p>In order to avoid the issue of loss of trust due to lack of root of trust, all users' keys must
|
||||||
be stored in a centralised location where all contacts are able to go to in case of compromise or to
|
be stored in a centralised location where all contacts are able to go to in case of compromise or to
|
||||||
periodically check the state of keys and to see if they have changed. This centralised location
|
periodically check the state of keys and to see if they have changed. This centralised location
|
||||||
@ -120,7 +95,6 @@
|
|||||||
person who initially signed up for the platform, using a trust-on-first-use (TOFU) model, which
|
person who initially signed up for the platform, using a trust-on-first-use (TOFU) model, which
|
||||||
isn't much different than what today's centralised platforms are already doing; the only difference
|
isn't much different than what today's centralised platforms are already doing; the only difference
|
||||||
is who is controlling the location; trust is still present and required.</p>
|
is who is controlling the location; trust is still present and required.</p>
|
||||||
<br>
|
|
||||||
<p>In order to have a root of trust, I have posted my keys to my website, which is protected by
|
<p>In order to have a root of trust, I have posted my keys to my website, which is protected by
|
||||||
multiple layers of security:<br>
|
multiple layers of security:<br>
|
||||||
<br>
|
<br>
|
||||||
@ -136,17 +110,14 @@
|
|||||||
it.</li>
|
it.</li>
|
||||||
<li>I have enabled DNSSEC on my domain, so it is extremely difficult to spoof my domain to make you
|
<li>I have enabled DNSSEC on my domain, so it is extremely difficult to spoof my domain to make you
|
||||||
believe you're connecting to it when you're actually connecting to someone else's.</li>
|
believe you're connecting to it when you're actually connecting to someone else's.</li>
|
||||||
</ol>
|
</ol></p>
|
||||||
<br>
|
|
||||||
<p>While not the most secure implementation of a root of trust, it is the most secure implementation
|
<p>While not the most secure implementation of a root of trust, it is the most secure implementation
|
||||||
currently available to me. While the domain name registrar or virtual private server host could
|
currently available to me. While the domain name registrar or virtual private server host could
|
||||||
tamper with my domain and data, they are the most trustworthy parties available. In its current
|
tamper with my domain and data, they are the most trustworthy parties available. In its current
|
||||||
form, decentralisation would make this impossible to implement in any form.</p>
|
form, decentralisation would make this impossible to implement in any form.</p>
|
||||||
<br>
|
</section>
|
||||||
<br>
|
<section id="conclusion">
|
||||||
|
<h2 id="conclusion"><a href="#conclusion" class="h2">Conclusion</a></h2>
|
||||||
<h2 id="conclusion"><a href="#conclusion" class="h2"
|
|
||||||
>Conclusion</a></h2>
|
|
||||||
<p>Do not demand anonymity; demand privacy and control of your own data. Complete anonymity makes it
|
<p>Do not demand anonymity; demand privacy and control of your own data. Complete anonymity makes it
|
||||||
impossible to have a root of trust, and is typically never necessary. It is possible for someone
|
impossible to have a root of trust, and is typically never necessary. It is possible for someone
|
||||||
else to hold your keys, without them taking control of them and dictating what you can and cannot do
|
else to hold your keys, without them taking control of them and dictating what you can and cannot do
|
||||||
@ -164,8 +135,6 @@
|
|||||||
Decentralisation does not solve the government issue. In order to live a happy, fun, and fulfilled
|
Decentralisation does not solve the government issue. In order to live a happy, fun, and fulfilled
|
||||||
life, while protecting yourself against logical threats, there are only two words you must live by:
|
life, while protecting yourself against logical threats, there are only two words you must live by:
|
||||||
Threat model.</p>
|
Threat model.</p>
|
||||||
<br>
|
</section>
|
||||||
<br>
|
</body>
|
||||||
</body>
|
|
||||||
|
|
||||||
</html>
|
</html>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user