technology:internet protocols

  • Unveiling #blockchain’s full Potential

    Unveiling Blockchain’s full Potential — A new Era of Internet Protocols and ApplicationsWhat you can expect from the read:Introduction to cryptoeconomic mechanism design, a new art of designing protocols next to cryptography or machine learning, including what it is and what is the rationality, and how you can leverage it in your own applications and protocolsA discussion why Blockchain is the missing technological piece to harness cryptoeconomic mechanisms in Internet applications and servicesTwo example HTTP protocols showcasing the power and practicabilitySummary of future emerging killer applications resulting from the application of cryptoeconomicscourtesy of Kristina FlourCryptoeconomic mechanism designing is the true ingenuity of Blockchain. In this article we explore the (...)

    #cryptoeconomics #future-internet #mechanism-design #technology

  • Net of Rights - YouTube

    Net of Rights is a short documentary film which explores the relation between Internet protocols and the promotion and protection of Human Rights. Internet Engineers have defined the Internet as a network of networks, providing connectivity for all users, at all times, for any content. Internet connectivity increases the capacity for individuals to exercise their rights, the core of the Internet, its architectural design is therefore closely intertwined with the human rights framework. However, the assertion that technology and the design of standards and protocols is a ethically neutral task are still commonplace. The series of interviews recorded during the 92nd meeting of the Internet Engineering Task Force (IETF), held in Dallas, Texas, in March 2015, demonstrated that this belief in the neutrality of standards and protocols is starting to change. It is becoming more apparent that promoting an open, secure, unfiltered and reliable Internet is essential for the rights to privacy, expression and assembly. But how can these concepts be addressed on the protocol level? Without taking human rights into account while developing protocols, the human rights-enabling characteristics of the Internet are at risk. While the Internet was designed with freedom and openness of communication as core values, as the growth in scale and commercialization of the Internet have caused a shift in those values. The influence of such world-views started to compete with other values. The rights-enabling characteristics of the Internet will be endangered if they are not properly defined, described and protected. The reverse is also true: if we don’t protect human rights online, we risk loss of functionality and connectivity of the Internet itself.

    #Internet #Droits_humains #Protocoles

  • A Net of Rights? New film links Human Rights and Internet Protocols · Article 19

    It is too-often assumed that there is no link between protocols (the standards which underpin the way the internet functions) and human rights, but this is simply not the case, as the film argues. The Internet aspires to be the global ‘network of networks’, providing connectivity for all users, at all times, for any content. Connectivity increases the capacity for individuals to exercise their rights, meaning that the architectural design of the internet is, necessarily, intertwined with the human rights framework.
    Promoting open, secure and reliable connectivity is essential for the rights to privacy, expression and assembly. But how are these concepts addressed at the protocol level? Without proper definition, the human rights-enabling characteristics of the internet are at risk.[width]=512

  • NTP - Network Time Protocol - can be abused for attacks on HTTPS, DNSSEC, and Bitcoin.

    Researchers at University of Boston describe how unencrypted NTP traffic can be intercepted and then used to change the time of clients. For example, the clock can be turned back to a point where the host would accept a fraudulent digital certificate that has been revoked.

    Or by advancing the time on a DNS resolver the DNSSEC validation can be made to fail.

    The researches also give advice on how to protect yourself against these various attacks.

    Attacking the Network Time Protocol

    Abstract—We explore the risk that network attackers can
    exploit unauthenticated Network Time Protocol (NTP) traffic to
    alter the time on client systems. We first discuss how an onpath
    , that hijacks traffic to an NTP server, can quickly
    shift time on the server’s clients. Then, we present a extremely
    low-rate (single packet) denial-of-service attack that an off-path
    , located anywhere on the network, can use to disable NTP
    clock synchronization on a client. Next, we show how an off-path
    attacker can exploit IPv4 packet fragmentation to dramatically
    shift time on a client. We discuss the implications on these
    attacks on other core Internet protocols, quantify their attack
    surface using Internet measurements, and suggest a few simple
    that can improve the security of NTP.