Menu

Switch to the dark mode that's kinder on your eyes at night time.

Switch to the light mode that's kinder on your eyes at day time.

Switch to the dark mode that's kinder on your eyes at night time.

Switch to the light mode that's kinder on your eyes at day time.

in

betrusted.io, Hacker News


Betrusted is a protected place for your private matters. It’s built from the ground up to be checked by anyone, but sealed only by you. Betrusted is more than just a secure CPU – it is a system complete with screen and keyboard, because privacy begins and ends with the user.

p version

The Birds, the Bees, and the Private Keys

A hacked phone or laptop means all of your passwords, private keys, authenticator tokens and other secrets are potentially compromised. To guard against this, systems are starting to incorporate physically distinct “ enclaves” (aka) secure elementsorTPMs). An enclave is like having a safe in your house: even if the lock on the front door is broken, the thief still can’t access the contents of the safe.

Today’s enclaves protect only certain cryptographic secrets, such as private keys. These enclaves lack human-friendly I / O and must delegate the task of rendering and recording information to a less secure host.

This leads to an important nuance: protecting private keys is not the The same thing as protecting your private bits. A remotely-controlled keyboard logger can still record your passwords as you type them; a screen grabber can still read your messages, photos, and authenticator tokens as easily as you can.

Betrusted solves this problem by incorporating easily auditable Human-Computer Interaction (HCI) elements to the security enclave. Betrusted ensures that human-readable secrets are never stored, displayed, or transmitted beyond the confines of the betrusted device: betrusted is a security enclave with human-friendly I / O.

HCI-driven security model

HCIstands for Human-Computer Interaction. It’s about making computers usable.

Adding human I / O to an enclave means tackling the diversity of human language without compromising security. Thus a key challenge for betrusted is striking a balance between best security practices and a native-language HCI: more features means more attack surfaces, while too few features renders the device too difficult to use.

Therefore, correctly scoping the HCI aspect is critical. Betrusted’s HCI scope includes text and voice messaging support.

TheHCI rationalepage explores the core HCI requirements.  Thebetrusted architecturepage covers how HCI and security requirements come together into a single device.

  • Building betrusted

    Trust starts with transparency. Food is labeled with their ingredients, and subject to routine tests for quality and contamination. This keeps us safe from foodborne illnesses. As long as technology remains a black box, we should not be surprised that bad actors can hide viruses in our devices.

    Betrusted aims to build a full technology stack, including silicon, device, OS, and UX, that is open for inspection and verification by anyone: experts, governments, and users are free to audit, critique, confirm and improve its ability to keep secrets. You, the user, get to pick which version or provider for betrusted you trust the most. Thus, the only secrets in betrusted are the ones you choose to seal in it.

    The depth of this tech stack represents a significant engineering effort, spanning multiple disciplines across the techology spectrum. We welcome the contributions of all free / libre software developers: please visitour github repo.

    The project is currently at the early hardware prototype stage. The current plan divides the project into three phases: a developer-only alpha; an early-adopter beta; and finally, a consumer-ready product.

    Learn more about thebetrusted development plan.

    Betrusted device concept

    Betrusted is not a phone******************: it is a secure enclave with auditable input and output surfaces. Betrusted relies on sharing your existing connectivity – such as your phone or cable modem – to access the Internet. Say you’re on the road and you want to securely message a friend. You would tether betrusted to your phone’s wifi, so that the phone is just an untrusted relay for encrypted messages coming too and from betrusted. The only place the decrypted messages will ever appear is on the trusted screen of a betrusted device.

    The first generation of betrusted will incorporate a WiFi interface. Read more about howbetrusted handles networkingto understand How your betrusted can be extended to handle your favorite network interface.

    As a secondary device, betrusted aims to occupy a minimal footprint. The typical usage scenario integrates betrusted into the protective case of your existing mobile phone. This usage scenario requires betrusted to be physically as thin as practical. This “thin as practical ”criteria influences virtually all of the design decisions around the device hardware.

    betrusted is also designed with a special low-power consumption “Memory LCD” screen that can display information all day without draining its battery. This always-on feature allows betrusted to serve as a kind of notepad for your life’s private details. For example, saving bitmap images of your airplane boarding passes on betrusted allows you to board an airplane without having to turn on your phone.

    Below are some concepts to give an idea of ​​what the betrusted device might eventually look like.

    First-Generation Alpha Hardware******************

    The alpha hardware is implemented using a FPGA containing a RISC-V soft core. The primary goal of this phase is to solidify the specs of the eventual betrusted system through development and testing on a looks-like, works-like prototype.

    Above is a photo of an early alpha hardware unit. A superset of proposed features are represented in this prototype to facilitate HCI experimentation.

    Read more about thealpha hardware FPGA.

    Please visit thebetrusted wikifor more technical information. The mainbetrusted github repository

    will also begin begin to fill in as more technical details come online.Morsels you may be interested in************************************** Avalanche Noise Sourcedesign notes

    The betrusted-io github repository’s people pagelists the developersthat haveelected to reveal their participation publicly.

    The administrative contact for the betrusted.io project isAndrew ‘Bunnie’ Huang(@ bunniestudios/blog).

    The Betrusted team is funded in part by theNLnet Foundationvia Privacy & Trust Enhancing Technologies grants.

           (********************************************* (************************************************Brave BrowserRead More******************** ****************************

  • What do you think?

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    GIPHY App Key not set. Please check settings

    Luka Doncic Isn't Magic Johnson but an Ideal Blend of Two Modern-Day Icons, Crypto Coins News

    Luka Doncic Isn't Magic Johnson but an Ideal Blend of Two Modern-Day Icons, Crypto Coins News

    The Ultimate Acorn Archimedes talk, Hacker News

    The Ultimate Acorn Archimedes talk, Hacker News

    Back to Top
    close

    Log In

    Forgot password?

    Forgot password?

    Enter your account data and we will send you a link to reset your password.

    Your password reset link appears to be invalid or expired.

    Log in

    Privacy Policy

    To use social login you have to agree with the storage and handling of your data by this website. %privacy_policy%

    Add to Collection

    No Collections

    Here you'll find all collections you've created before.