Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Kaminsky Warns Black Hat Audience of Risks to the Internet

    Written by

    Sean Michael Kerner
    Published August 3, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      LAS VEGAS—In a rambling, hourlong keynote address at the Black Hat USA conference here today, security luminary Dan Kaminsky detailed the risks and the opportunities inherent in the internet.

      Kaminsky first shot to fame in 2008, when he revealed a flaw at that year’s Black Hat USA event in the pervasive Domain Name System (DNS) protocol. At the time, he said that a web doomsday had been averted and the continued safe operation of the internet could continue. Now in 2016, with threats of government surveillance and an ongoing public debate about the use of encryption, Kaminsky once again sees the basic fabric of the internet to be at risk.

      “We have work to do to keep the internet working,” he said. “I’m here to encourage everyone to notice what is wrong, how it can get worse and what we can do about it.”

      Kaminsky said that it’s possible that the internet as we know it today could be lost if bad policies are enabled that restrict the promise of an open internet. He recounted that AOL in the United States and Minitel in France were two predecessor internet-like networks that were successful for a while but failed when the internet we have today emerged. The reason why those other networks failed in Kaminsky’s view is because they had central authorities and were not fully open and distributed to global innovation in the way that the modern internet is today.

      Fears over security could lead to a more closed internet, and that’s not a good thing. Kaminsky said that with the internet of things (IoT), people are assuming it to be insecure right out of the gate. He added that while that might be true, assuming such a new technology is insecure so soon is vastly different from the smartphone experience. Smartphones, which have been around for a decade, weren’t assumed to be insecure at the outset.

      “I worry about the ability of developers to innovate without being smothered by security concerns,” Kaminsky said.

      Defense Minus Offense Equals Compliance

      Kaminsky said that while he knows full well that many attendees of the Black Hat conference just like breaking things, he’s OK with that because he’s the same way. That said, Kaminsky quipped that defense minus offense is just compliance.

      The challenges of building secure applications are not trivial, and generally speaking there isn’t the software equivalent of a “building code” that mandates that all code that is written properly and everyone adheres to secure coding practices.

      The modern internet is in Kaminsky’s view what users want it to be. If, for example, a browser implements filters to restrict access, users will use different browsers and find ways to get what they want.

      When it comes to encryption, Kaminsky didn’t mince his words.

      “You have two choices—either use an encrypted channel and that’s how you have secure access, or everything is in your own building and literally it’s the computer equivalent of putting the dollar bills in your mattress,” he said.

      In terms of security in the cloud, Kaminsky said that he loves Docker containers and the isolation they can provide to enable security. He’s also a big fan of the cloud model in general, and when properly implemented he sees it as a way to limit risks by benefiting from integrated security.

      In the final analysis though, Kaminsky really just wants security people to share best practices for security more widely. He also advocates for the use of environments and coding frameworks that make it easier for developers to implement security without compromising usability.

      “If we want to make security better, give people environments that are easy to work with and still secure,” Kaminsky said. “We have an internet to hold on to. We have to figure out what people want to do and help them to do it safely.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.