I probably feel very much like most people in that the Internet is feeling less and less safe to use. Viruses have been around a long time, but once you learned to not open emails you didn’t recognize, that risk became somewhat minimal. But now you can get viruses just by opening a web site that has corrupted ads. I know this because I got three such viruses a few weeks ago.
But that’s not even the scary part since I can generally scrub viruses from my computer. There are far worse risks than viruses today. To start with, there are the people who are sending malware and then holding your computer hostage until you pay them (and who then, apparently, still don’t fix your machine).
And it appears that everybody is spying on us. Edward Snowden has shown us numerous ways that the NSA is watching us. I literally get dozens of new tracking cookies on my computer every day from commercial companies that want to track me somehow. And every large web company is apparently gathering data on us, including companies like Facebook and Google along with most of the apps we put onto our smartphones.
But since my work depends on using the Internet, and since it also has become one of my major sources of entertainment, I am not likely to abandon the Internet due to lack of safety. I do what I can to be safe, but I doubt it makes much difference. I scrub my machine every day from tracking cookies and I use browsers that supposedly don’t track me. But my guess is that those two things make almost no difference for protecting my computer or my privacy.
The biggest problem, aside from every web entity trying to build a profile on me, is that the entire web is based upon a model where everything we do winds up somewhere at end points that cannot be made safe. Everybody is touting encryption as a way to stay safer on the web, but every encrypted message end up at a machine somewhere that decrypts it, and it is the end computers and servers that are the weak points in the Internet. Your data is stored on servers that are out of your control, and your safety relies on the people running those servers to be safe. And we all know that hackers are breaking into servers every day, and it may even turn out that there are back door spying keys built directly into most server software.
There are experts who say that the lack of safety might kill the Internet. We are incredibly reliant on companies that we don’t know to keep our data safe – and we have seen that both hackers and nefarious insiders can compromise almost any company. If the hackers win the war then it will become too unsafe to buy anything over the web (or even give your credit card numbers to vendors in some other manner if they are going to keep the info on their servers).
But there are alternate models of the Internet that might offer solutions. One of these is known as a block chain. Block chains are a decentralized system of communication that lets end users communicate directly with each other without having to go through the normal centralized servers. The block chain technology is most well known as the basis of Bitcoin and other cryptocurrencies. There have been numerous articles and papers written about the wild swings in Bitcoin pricing, but that has to do with basic economics rather than the underlying technology that allows the transactions.
In a block chain network, each member of the network has a copy of the software that identifies them as part of a particular block chain. Before communication is allowed between any two members of a block chain the identity of each party must be verified by somebody else who is part of the chain. With such verification the communication is allowed. The process is slow compared to normal web transaction, perhaps 10,000 times slower than a normal text or email. But it is safe. The steps needed to operate a block chain are as follows:
- New transactions are broadcast to all nodes.
- Each node collects new transactions into a block.
- Each node works on finding a difficult proof-of-work for its block.
- When a node finds a proof-of-work, it broadcasts the block to all nodes.
- Nodes accept the block only if all transactions in it are valid.
- Nodes express their acceptance of the block by working on creating the next block in the chain, using the hash of the accepted block as the previous hash.
There are already some examples of block chains being used for communications other than financial ones. For example, the protesters in Hong Kong last year established a block chain so that they could communicate with each other without Chinese government oversight.
There are new companies that want to use block chains to bring safety into other types of communications. For example, Codius is using block chains to provide safe online legal transactions. This provides a way for parties to safely sign contracts without having to exchange paper. Ethereum is working on a block chain technology that could be used as the basis for any kind of communication. They think their platform could be used for things like private chats, private emails, and even safe web searches.
One can envision many other uses for using block chains to create safe communications among specified groups of users. That might be a corporation and its employees, all of the students in a given dorm, or just about any group that wants safe communications. Such a closed system would provide for secure and private communication within the block. It’s not a total solution, but it’s a start.