paint-brush
How to Use Guerilla IoT for End-to-end Encrypted Messaging by@richkurtzman
280 reads

How to Use Guerilla IoT for End-to-end Encrypted Messaging

by Rich KurtzmanJuly 26th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Encrypted messaging is already a thing, yes, but we’re talking end-to-end encryption. It’s fast-moving, small-scale tech which moves against the orthodox. Big tech companies are using our data, mostly to sell us unneeded things on the internet. But they’ve also collected data figuring out what keeps us on their website for longer.Encrypted messaging apps are even more important if you're fighting against a corrupt government or reporting on one, like a journalist.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How to Use Guerilla IoT for End-to-end Encrypted Messaging
Rich Kurtzman HackerNoon profile picture


Guerilla IoT. Yes, it sounds as cool as it is.


But what is it?


It’s fast-moving, small-scale tech which moves against the orthodox. It’s unconventional, low-budget but still badass.


Think James Bond-like tech used to defeat his enemies, the supervillains. Tech like an encrypted messaging device, for instance.

Encrypted messaging

Encrypted messaging is already a thing, yes. But we’re talking end-to-end encryption.


Before we get to the juicy stuff, we should examine why encrypted messaging is so big right now.


Well, the answer is simple and should come as no surprise.


Big tech companies are using our data, mostly to sell us unneeded things on the internet. Ever notice you get an ad on Instagram right after purchasing that product? Unfortunately for the algorithm makers, they haven’t figured that part out quite yet. “Dude, I just bought a new mattress, why are they trying to sell me a new one,” we may wonder.


Or, they’re using that data to figure out what makes us tick. What do we love and what do we hate? Then, they (Facebook/Meta, Google, Amazon and more) shove the things we have strong reactions to in our face. Because they’ve also collected data figuring out what keeps us on their website for longer.


Encrypted messaging apps are even more important if you’re fighting against a corrupt government or reporting on one, like a journalist may be.


As in Oct. 2021., “Favored by tech giants, cybersecurity experts, journalists, government officials, and many more, Signal has gone from a darling secret of the security community to a group chatting phenomenon.”

Can you trust the app is encrypted, though?

Some apps boast about their end-to-end encryption, but is that the case?


“The idea being: You can always hack an OS and install a keylogger. So, even if you are communicating on a P2P end-to-end encrypted app like Signal, you can never be sure the device you're using is secure itself. So, the app is secure doesn't matter,” Fathym CEO Matt Smith explained.


This is not to say Signal isn’t doing a good job, it is! However, operating systems themselves can and will be hacked and a keylogger can simply show the hacker what passwords are. And even more, a keylogger virus can show what those secret messages are as they’re being typed on the keyboard before they’re even sent!


So, let’s go one step further and create an end-to-end hardware-level encrypted messaging device.

How it works

We start with the (for a mere $9.95) for the hardware encrypted message and an (more expensive) for satellite communications.

Sparkfun Cryptographic Co-Processor


Iridium 9603


“The Cryptographic co-processors encryption keys are burned at the same time and are paired,” Smith explained. “The secure device only runs known code (doesn't have an operating system to hack). So, it's secure end-to-end worldwide. “


So, anyone could use our secure architecture of encrypted messages from and to anywhere in the world.


And this is how the infrastructure would look:

Secure Device ( or Artemis w/ + keyboard) <-> Cryptographic co-processor <-> Iridium <-> Fathym <-> Cryptographic co-processor <-> Secure Device

Conclusion

As you can see, the important link between the secure devices is Fathym and our IoT Ensemble allows you to easily and quickly connect device APIs and it acts as your virtual app developer, managing the Microsoft Azure complexity. IoT Ensemble handles all of the heavy liftings in Azure, securely hosting your data in the cloud.


Take encryption to the next level with Fathym and this end-to-end encrypted messaging device.Sign up for a and jump into to start connecting devices and go from James bond to 007.


Also Published

바카라사이트 바카라사이트 온라인바카라