A long word about security….
The revolutionary Elastos Smart Web Scheme is the most secure practice currently known to prevent not only unauthorised access to data but also man-in-the-middle, denial of service, and other attacks.
Around 2000 the Chinese Government recognised the same problem as everyone: the inherent insecurity of the internet, despite “patches” in so many ways to close security holes.
They funded the development of what eventually became the Elastos Smart Web System. But it was not until 2008 (with the translation of the BitCoin BlockChain Whitepaper into Chinese) that there was developed a secure and trustworthy format for storage of all the information required by the developing Smart Web System.
Until that point there would have been no more reason to trust the Chinese People than anyone else to not corrupt or otherwise tamper with database information regarding the Smart Web System. In the Smart Web System, every person, every one of the components in devices, each application installed on the device, and any other entities existing and associated with the device, when a device registers with Elastos, is also registered with a unique ID at the same time, and a system of always being able to assure the identity of an originator of a system request (an onboard application for example) is maintained.
This forms a basis to remove any external, unintended, unauthorised or harmful players from communications over the net and internally between apps, etc. This micro-identity system works perfectly to ensure no external (or internal) threats occur. The identification system is automated and may not be tampered with by any individual, as it is recorded on a blockchain.
It is in the nature of a truly Distributed BlockChain that you would have to have personal control over every device, at once, on the entire Elastos BlockChain globally, to effect a change which could be fraudulent. This is impossible. (Please refer to Block Chains).
The entirety of the Elastos code base is publicly verifiable open source code (100%).
The second component of the Elastos Framework ensures communication of data of any sort between Elastos-registered users &/or devices on the internet is safe, private and secure. It is called the Elastos P2P Carrier Network. The Carrier Network cooperates intimately with the Elastos “Runtime” onboard your device to ensure security.
This means processes occurring within your device and processes requiring communication between Elastos-Registered Devices are entirely safe. An Elastos DApp (or Distributed Application) protects all registered users, whilst keeping all players honest. In this way, the entire Elastos network of people, devices (and ‘Internet of Things’ components) is security-guaranteed.
If Microsoft Windows, Apple Mac OSX, Linux, the iPhone’s iOS, and Android are device-based Operating Systems, which allow networking between devices, Elastos forms a Global Network-Operating-System of which devices are merely a part. Reference to the Elastos Whitepaper will introduce anyone curious, to the new ways Elastos has to offer for security assurance.
There remains, however a threat which plagues Enterprises. It is the internal threat posed by Fraud. The criminal actions of a person or people otherwise authorised to use an ordering and financial system may be detected and virtually eliminated by imposing certain restrictions, checks and balances in a system. Thus organisations use Internal Auditing to verify transactions, in particular their appropriateness and authenticity. However it has still been the domain of certain Technical Employees and System Administrators to have access to the entire database (Superusers). The use of Block Chains, an idea originating with Bitcoin, the “crypto-currency”, removes the possibility of anyone at all editing the database of transactions on the “Blocks”. Thus a financial transaction journal (for example) running on a BlockChain is completely immutable. You have to perform any corrections via the normal (internally and externally auditable) accounting processes.
IT Cloud Solutions Australia also employs other standard methods such as ensuring separation of Order and Requisitions functions from Accounts Payable functions, as well as other safeguards against internal fraud.
Bulk Data Storage:
In general, Off-Device Data Storage itself and Cloud Operations, in combination with Device-Based Blockchains, are neither particularly restrictive in terms of (authorised) accessibility, nor expensive. It is, in fact, very safe and secure when done properly. The unique “hash” signature (.. the ‘signature’ only, not the volume of data) of each data file (eg Documents, Images, Audio, Video), is recorded (together with the other auditable data) on the Blockchain (Sidechain), and may be compared to the hash computed from the file, whenever retrieved, to check for tampering. The actual data files are stored on Elastos-enabled Amazon Cloud Servers, on your behalf.
“One of the keys to Computer Security is to assume that every connecting device is potentially hostile to your system.”
Therefore we remain vigilant but confident.
We Develop On Ubuntu Linux Virtual Machines:
Elastos Global Network Operating System, (since 2008) .. “Agnostic” to Operating System Brand
the Unix Device Operating System (since it began to escape from AT&T’s Bell Laboratories in the early 1970’s)
and the Open Software Foundation (1984 – 1996), whose members helped set it free
also, of course Linus Torvalds,
who originally licensed and studied an educational version of the Unix Operating System for PC’s (or “Microcomputers”) called “Minix” from Andrew S Tanenbaum in the form of a book with included source code – on Floppy Disks – (published by Prentice Hall) for $US69, based on the 1980’s series IBM/Intel-XT Personal Computer Architecture. (Unix, more a set of Standards now than “code”, was written originally for Minicomputers and Mainframes in networked multi-user environments, but there is no reason it can’t run in multi-user fashion on a PC, which is the same class of electronic device as any other – non ‘Quantum !!‘ – computer). On January 5, 1991 he purchased an Intel 80386-based (“80386” CPU or processor) IBM PC XT/AT “clone” computer before obtaining his MINIX copy, which in turn enabled him to begin work on Linux. He commenced work on Linux in mid-March, 1991 (see below “Tanenbaum” link).
Relationship with Linux
Early influence “…The design principles Tanenbaum applied to MINIX greatly influenced the design decisions Linus Torvalds applied in the creation of the Linux kernel…. Torvalds used and appreciated MINIX, but his design deviated from the MINIX architecture in significant ways, most notably by employing a monolithic kernel instead of a microkernel. This was disapproved of by Tanenbaum in the Tanenbaum–Torvalds debate. Tanenbaum explained again his rationale for using a microkernel in May 2006…” (Wikipedia)[ Nevertheless Tanenbaum (see the above link) admits that the demand for performance, in terms of computational process-speeds, but also in terms of speed in progress of the development effort, from users of Linux, outweighed the capacity of a microkernel system and militated in favour of developing a monolithic kernel, for practical reasons. The reasons for Tanenbaum’s preference for a “microkernel” lie in its security advantages. -Ed.]
“..Early Linux kernel development was done on a MINIX host system, which led to early Linux inheriting various features from MINIX, such as the MINIX file system.
In May 2004, Kenneth Brown of the Alexis de Tocqueville Institution made the accusation that major parts of the Linux kernel had been copied from the MINIX codebase, in a book called Samizdat. These accusations were rebutted universally—most prominently by Andrew Tanenbaum himself, who strongly criticised Kenneth Brown and published a long rebuttal on his own personal Web site, also pointing out that Brown was funded by Microsoft.
At the time of its original development, the license for MINIX was considered to be rather liberal. Its licensing fee was very small ($69) compared to those of other operating systems. Although Tanenbaum wished for MINIX to be as accessible as possible to students, his publisher was not prepared to offer material (such as the source code) that could be copied freely, so a restrictive license requiring a nominal fee (included in the price of Tanenbaum’s book) was applied as a compromise. This prevented the use of MINIX as the basis for a freely distributed software system.
When free and open-source Unix-like operating systems such as Linux and 386BSD (386BSD is an ancestor of Apple’s MacOSX -Ed.) became available in the early 1990s, many volunteer software developers abandoned MINIX in favor of these. In April 2000, MINIX became free/open source software under a permissive free software license, but by this time other operating systems had surpassed its capabilities, and it remained primarily an operating system for students and hobbyists….” Wikipedia (see “MINIX” link above).
+ The Unix/Linux open-source ecosystem (since 1991), All contributors, under the various open source based licences, past and present.
Thanks to: Rong Chen and Elastos
In 2000, Rong Chen, a senior alumnus of Tsinghua University’s Computer Science department, returns to China from Microsoft USA and begins research and development for the first-generation Elastos network Operating System.
In 2003, Rong Chen was received by Jin-Tao Hu, the former CPC General Secretary.
In 2006, Rong Chen completed the kernel and graphics systems.
In 2007, Rong Chen built a complete smartphone and massively produced it.
In 2009, China Unicom used Elastos’ middleware as a fertile phone operating system framework.
In 2013, Foxconn invests in the Elastos open source project to build a distributed, cross-internet industrial Internet of Things and a smart home network operating system.
In May 2017, Rong Chen co-founded the Elastos Foundation with Feng Han to support Elastos – a blockchain-driven Internet project, attempting to create a new digital smart economy model that turns numbers into wealth.
In 2017, Sunny Feng Han and Ji-Han Wu started running the Bitcoin Investment Elastos Blockchain Community and an alliance with Bitmain and NEO started to take shape.