Friday, September 29, 2017

The current web is hilarious

The police stated that the attack methodology was a “spear phishing” attack. North Korean hackers pretended to be government authorities and servicemen. A story published by Silicon Angle states that the hackers targeted exchange workers by sending them emails loaded with malware.
Secure elements change all this, but we do not even need that.  The Intel hardware security standard protects and verifies executable, as needed.   

The deeper question.  Why was any human authorized to move bitcoin at all without biometric ID?  Let the hackers run wild, just keep the goodies in a contiguous section of protected executable and data.  It is not accessible via memory operations, hardware prevents that.  But it is accessible via device IO methods, executed from within the protected space.

The sandbox uses hardware security, just like bit coin uses block chain.  Locally all the trade books are protected, as is all the trading bot executables, including the pit boss.  All the contracts in the smart layer protected via local hardware.  Any passage across the layers requires secure element protection.

No comments: