top | item 10082153

(no title)

astrocyte | 10 years ago

I'm glad that people found this to be a point of significance. I've worked in the commercial networking hardware industry for some years and shelved several consumer ideas due to a lack of interest in security/privacy.

I have watched over many years as this 'cloud' software bonanza has eclipsed the tech industry. It went away from its original intent a long time ago and now is used as the holy-grail method of :

> ensuring (rent) is always paid for service(s) people should OWN

> vacuuming up and selling people's data.

I have several projects on my plate. However, I have a solid one for securing people's data when it comes to the IoT movement (in hardware)... It revolves around the same hardware/technology that the industry uses to scrape and funnel your data except the home user will now have it at their disposal as well.

Users should have 100% control of their data. If someone wants to 'monetize' it or use it to 'improve' their platform, the user should be rightfully paid for the opportunity to do so.

Disruption? Yeah, I think it's time. The foolishness has gotten far too long in the tooth.

.. And the backwards thing about it is: there are simple and straight forward ways to secure data (in hardware). It's only because everyone in the industry wants to ship your data all over the place and data-mine the snot out of it that things are as insecure as they are.

The very (loop-hole) or (door) that is used to funnel/mine/monetize/cloudify data is the very one used as an attack vector. Complicating the crap out of things at that point defeats the whole purpose.... Get rid of the door all together and the home is the least of all places where you should be exposing yourself.

discuss

order

lifeisstillgood|10 years ago

I agree with the idea that the best protecting n for privacy is to make it expensive to snoop - it's worked for thousands of years so far.

My concern is how to make the benefits of this huge amount of data (medical information, travel etc) possible while charging the other use.

It's just - how - does one attach the metadata and enforce the lolicensing?

astrocyte|10 years ago

Therein lies the 'product' ... I'm working on several projects so I wasn't shy to put the general idea of this one out there... It's one of many things I feel passionately are going to be changed by disruptive paradigm shifts ahead.

That being said, you come up w/ the 'solution' and you'll have your 'product'... I already have a general architecture/approach outlined for myself. Create one and, from the looks of the interest here, you'll have an audience to buy it.

Also, with the scale and depth of hacks occurring around the world, you'll soon have an even broader audience.

If you get funded, look me up ;). I'll be looking for work in the coming months =P.

Natanael_L|10 years ago

Multiparty Computation, homomorphic encryption, Private Information Retrieval, etc...

Unfortunately they're not very efficient, and have limited security guarantees. But that's part of an approach to do it securely.

Fuxy|10 years ago

That is why i don't buy into this hype what so ever. Anything that has 'cloud' on it when it doesn't need to I avoid.

I'd rather set up my own router with pf-sense and a industrial WiFi access point.

I really love the concept of complete home automation however the data needs to stay in the home and companies need to ask for permission to mine it.

I have nothing against data mining it can be incredibly helpful but i want full control over weather i choose to share it or charge a small fee for my data.