Since the dawn of computers, one of the most difficult things to get right has been cybersecurity – the art of keeping data and computers safe from prying and thieving eyes and hands. This discipline is properly described as an art rather than a science because, while there are best practices and conventions that one can follow to increase safety, the idea of a “hackproof” computer remains the elusive holy grail of the industry. The frightening truth is that anything with a chip in it can, through some means, be compromised. This is not likely to change any time soon.
This truth is frightening to many due to the manner in which computers and computer-based devices and appliances have come to permeate our society. Much of our wealth as a society and as individuals is stored and can be accessed using a computer. The rise of cryptocurrency has accelerated this process. Indeed, all cryptocurrency is only as safe as the private key used to sign transactions. Suddenly, cybersecurity transcends preference and convenience and assumes the aspect of a necessity for survival. All of this doesn’t make it any easier to accomplish. If wishes were horses, we would all be storing our digital currencies in hackproof digital silos that no one can break into. In reality, attempts to design such a system inevitably reach the point where they have made it nearly impossible to use and spend the currency. This is not practical. Such systems may have uses for things like long term storage of essentially frozen wealth but they do not solve the underlying problem. As soon as we go to actually use some of this wealth, we necessarily must expose ourselves to increased risk. So how can we keep our money safe while still maintaining the usability of blockchain technologies? As with many innovations, one possible answer comes to us from the skunkworks of the underworld - the black market. Here we find people who, through necessity, continually discover new and improved ways to stay one step ahead of the law by remaining untraceable. Some people may not like these people or what they are doing - certainly law-and-order types do not - but regardless of the value judgment there is a lot we can learn from them.
One great example is a staple of the modern day underworld – the burner phone
. This is a throwaway phone that, either because it has been prepaid or stolen, cannot be traced back to its owner when used to facilitate a crime. Law enforcement has of course realized this, and have pressured lawmakers into making such devices more difficult to obtain. They know the concept works, and it works because it sidesteps conventional security issues by diminishing the importance of the device itself. It is disposable, and so therefore is its history and any connection to the person that was using it. One of the largest cybersecurity surfaces of vulnerability is persistence. Data persistence these days does not just include files that we have explicitly told the computer to save to disk. Modern computers and operating systems collect and store data on their own. And much of this is metadata that can be used to identify, compromise and steal from the person that used the computer. The continued existence of the computer after use is actually a gaping hole in even the most prudent security strategies.Once we realize this, even a VPN does not offer peace of mind, for a VPN only secures the connection, not the endpoint. Somewhere there is still a persistent computer that we are logging into, and that computer if compromised will undo all of the protections enjoyed during data transit on the VPN. Only by destroying a computer after we use it can we be sure, absolutely sure, that it cannot come back to haunt us. Unfortunately this is not very practical.The next best thing, and nearly as secure, would be to wipe a computer after using it. Virtualization has made this possible, though not practical for many users. By discarding everything we have used, right down to the operating system, we can render a computer useless for the purpose of discovering what we were doing and for recovering and exploiting important data like passwords and private keys. This is the genius behind CryptoSecure
. Their platform allows users to achieve this level of security easily and predictably. This is important, because it means the difference between elegant theory and useful, real-world applications. For a tool to be useful people must actually be able to use it, and CryptoSecure
has designed a platform that does just this. Log on to CryptoSecure
, and it creates a brand new virtual computer for you to transact on. Log off, and the computer is destroyed.
Combined with other elements, such as a keylogger-proof wallet that works with the platform, and what you have is an answer to the currently uncomfortable question: how can I keep my cryptocurrency safe. This is how, and if anything speaks to the potential success of this company it is this. This is a problem that many people seek an answer for, and CryptoSecure
makes it a reality.A reality, and not a promise. For CryptoSecure
is not offering vaporware that looks good on paper but cannot be implemented. They have come to the table with a working platform, and anyone can download a free 7-day trial
and try it out for themselves. In the ICO world this is big, and offers an increased level of confidence for potential investors of their token. And while sometimes it is necessary to invest in little more than an idea if we want to see it become a reality, investing in CryptoSecure
requires no such leap of faith.So whether you’re looking for a platform to keep your assets safe, or an exciting investment opportunity that won’t last long, I strongly urge you to check out what they’re doing over at CryptoSecure
. Their whitepaper
is a detailed and thorough document that gives a clear picture of how the system functions. And the platform is available for anyone to try for free. The public ICO ends April 25th, so if you’re looking to invest the time to do it is now.