Sunday, September 28, 2014

The Centralized Internet

Try to picture the vastness of the Internet – and not just the World Wide Web or otherwise publicly resources. Think about how much of your day relies on your being able to access it, how much data is being exchanged every second. The mental picture seems to be larger than life, doesn't it? There can't possibly be only a handful of companies that control intercontinental IP transit in its entirety! While there is some dispute over what qualifies an entity as a Tier-1 internet service provider, it is usually agreed that such providers do not pay for data transit; they include: AT&T, CenturyLink, Cogent, GTT, Deutsche Telekom, Level 3, NTT Communications, Sprint, Verizon, and XO Communications. (http://www.technologyuk.net/the_internet/internet/internet_service_provider.shtml) That's it. If you are sending or receiving any data internationally/over geographically long distances, chances are that your data is passing through at least one or two tier 1 networks. To appeal to what appears to be the talk of the times, it's apparent that it really wouldn't be exceedingly difficult to monitor data ingress and egress to and from a particular region or country.

Next, imagine that the confidentiality of your data (while in-transit over the Internet) depended on a mere few dozen corporations – the name “VeriSign” probably rings a bell. VeriSign is one of the larger, more popular certification authorities in the world. VeriSign, like the other certification authorities, runs its service based on the concept that they are universally trusted – all operating systems and browsers implicitly accept any resource as “genuine” if they have been verified by VeriSign. To put that into perspective, websites and services like PayPal, Facebook, Amazon, Twitter, and countless others depend on a third-party organization (like VeriSign, DigiCert, or Comodo) in order to prove to their users that they are “genuine”, and to prevent anyone else from easily assuming their identity under false pretenses. In essence, the very foundation of confidentiality, data integrity, and “trust” is deeply flawed; in theory, if a certification authority wished/was compelled to, they could very easily spoof any website/service or decrypt any data sent from/to one of their customers. Suppose all certification authorities were saints, and would never accept a court order or bribe intended to persuade them to compromise a client of theirs. Yet, a problem still remains: security of the authority themselves. It isn't beyond imagination that such an authority can be hacked, is it? In fact, it's happened in the past. (https://www.schneier.com/blog/archives/2012/02/verisign_hacked.html (https://technet.microsoft.com/en-us/library/security/2607712.aspx)

I'm probably expected to offer a solution of some sort, but that's not why I chose this topic for this week's post. My main motivation in writing this was to simply portray how much we depend on a select handful organizations for the Internet/WWW to function correctly. There are, of course, some “solutions” (meshnets, keyless SSL, etc.) that have been offered to both of these issues, but they will likely be very difficult to implement on a widespread scale.


No comments:

Post a Comment