building the MetaFi ecosystem to bridge the gap between CeFi and DeFi

building the MetaFi ecosystem to bridge the gap between CeFi and DeFi


09 April 2019, 10:04

2 min reading

Trust No One: #TechMind Tips To Remain ‘Unhacked’

Information is power. You know it. We know it. Hackers know it. Following one of Facebook’s longest outages in history, Crypterium’s deputy CTO #TechMind is back to shed some light on how tech companies can prevent potential attacks. Oh, and there are tips for you too. What is the first thing you do when you

Trust No One: #TechMind Tips To Remain ‘Unhacked’

Information is power. You know it. We know it. Hackers know it. Following one of Facebook’s longest outages in history, Crypterium’s deputy CTO #TechMind is back to shed some light on how tech companies can prevent potential attacks. Oh, and there are tips for you too.

What is the first thing you do when you wake up in the morning? If you’re anything like me, you either turn off the alarm and go back to sleep, or you reach out to your phone and check on your social profiles. Nothing like a few likes to start your day… right?

Thousands of Facebook, Instagram and Whatsapp users woke up on Wednesday with that same intention: checking on their precious social profiles and messages. With one little exception: they couldn’t.

While company quickly confirmed the outage was not related to malicious efforts, questions had already begun swimming around inside users’ minds… “Was Facebook hacked? Was I hacked? Is the world ending?” These questions kept me thinking.

As someone who has worked with high-end technologies his entire adult life, I’ve been able to collect some useful tips on how companies can prevent a hack along the way. Here they are:

| Act like you’ve already been hacked

The best way to prevent a hack is to pretend the hack has already happened. The backend should not trust the information coming from the frontend. Credentials, amounts, all data should be double-checked. The reason? Frontend is simpler to attack.

If the hacker gets access to a device where the application is running, he can download the app to a computer, decompile it, look through the code, modify it, rebuild the app, reupload it to a device, and then exploit its vulnerabilities. I insist: never trust frontend.

| Make It Super Expensive

Every attack costs money and time. By making sure your security is not compromised by a single person, place, datacenter, or provider, you’re raising the cost for the hacker. For the attacker, a diversified security system translates into cracking multiple encryption algorithms, firewalls, etc. The rule is clear: make a potential hack as expensive as possible.

By raising your company’s security status to “too expensive to hack”, you considerably reduce the risk of becoming a target. The easiest way to think about it is looking at your competition. If your systems are more expensive to hack than other players in your field, you’re indirectly channeling hackers to easy money targets.

Let’s take Sony as an example. The company was hacked in 2011 by LulzSec mdash; an organized hacking group mdash; and it costed more than $170 million in damages. The hackers got names, passwords, emails and personal addresses of nearly a million customers.

While that might sound like enough reasons to upscale their security, the company remained on the cheaper end of the hacking grade. Evidence? The same hackers hit back against Sony, not Universal Studios, not Disney,… Sony! But ok… hackers costed the company much less than the previous time, just $100 million.

| Put It To The Test!

Intrusion tests are very helpful. All serious financial institutions conduct them. Crypterium is no exception. There are basically two kinds: black box and white box.

Black-box testing works under the assumption that the internal structure of the company is unknown to the tester. White-box testing, on the contrary, consist of giving the tester knowledge on your internal structure. During Beta stage, these tests were helpful to spot some minor bugs. Nothing to worry about… they were all fixed!”

| Separation of Duties: Decentralization Rules

One of the common and most effective ways to attack a company is through the people that work there. A hacker can offer your employee a million dollars in exchange for a password. They can also trick your employees to provide sensitive information. Separation of duties (SoD) restricts the amount of influence held by your employees. SoD plays a major role in preventing conflicts of interest, fraud and abuse cases. It also helps in detecting potential security breaches, and other threats to security.

Last year, Witness French film production and cinema chain Path eacute; found themselves in a mess of a kind. Several top executives fell into a trap of the so-called “CEO fraud” mdash; a social engineer email scam. The mechanics are pretty basic: a fake CEO or business leaders instructs employees within the organization to wire money to a designated location.

In this particular case, the business email compromise (BEC) scam costed the company about $21 million. Instead of focusing on why the CFO didn’t spot a fraud, but why did the systems in place allow the executive to make large payments in such an arbitrary way. And so it seems French justice agrees with my vision. Following these events, a court ruled in favor of the CFO, finding him not guilty of charges.

| State-of-the-Art Technologies

Encryption is certainly a must when it comes to preventing hacks. Modern storage systems allow us to transparently encrypt all data. If a hacker gets access to the underlying hardware, he or she won #39;t be able to read data as it would be encrypted on a higher application or data level.

| Ongoing Education (Not Just For The IT)

Educating your entire staff on security is crucial to avoid putting the company at risk. Without enough understanding on how hackers operate in today’s digital ecosystem, your employees are in danger and therefore, your organization too. Exaggerate? These are real cases. An employee gets a call from a lsquo;boss’ asking for a password. A salesman clicks on a shady link when searching information about a client. Teaching people how to prevent and quickly react in each of these situations might save you a big headache.

| Keeping Your Mouth Shut Doesn’t Help

There is a preconception that if you don #39;t tell anyone about your security, you will be more secure. In reality, this doesn’t work. Your company’s security cannot be based on the idea that lsquo;you think nobody knows how your company is secured.’ Why? Because, like it or not, someone will leverage that idea to hurt you. That’s precisely why the world’s secure algorithms and programs are open source. They are inspected by everyone. Openness is what makes security.

As deputy CTO at Crypterium, I can tell you this: our developers are doing their best to minimize all risks of an attack. Moreover, they’re also doing a lot to ensure your credentials remain in the right hands (yours, of course). This is how we make it safer:

2-Step Authentication

Crypterium is planning to implement a two-step authentication (2FA) in the nearest time. This solution helps in preventing unauthorized access to your account by requiring you to enter a unique code when you sign in and perform specific actions within the app.

The Hosted Wallet Model

Also, the hosted wallet model contributes in keeping your data off the radar. If you forget your password or lose your phone, you can regain access to your digital assets smoothly. This is something other wallets simply can’t do. Hosted wallets work pretty much as an online banking app: you trust your private keys to a third-party in exchange for security.

Another distinctable point about this type of crypto wallet is the ability to revert unwanted transactions. Imagine that some intruder tries to make an internal transaction with the Crypterium App. If that transaction was processed on blockchain, it would be extremely difficult for us to revert it. Keeping internal transactions off-chain helps users recover their funds easily. An interesting read on this matter here.

On a personal note, I suggest you to treat your credentials as something that really matters to you, like your bank card or car keys. Your credentials are the very first line of defense against internet thieves. If you’re using your address, school, or a lazy Star Wars reference for your password, it’s time for a serious change. Checking the websites you’re visiting, web browser certificates and the use of a password manager will also help you prevent potential attacks.

Let’s face it: no code is bugless. Hopefully, my tips will help your stay lsquo;unhacked’ for a long time.

About Crypterium

Crypterium is one of the most promising fintech companies, according to KPMG and H2Ventures. We are building a mobile app that meets the banking needs of the digital assets era.

Our goal is clear: with Crypterium, whatever you can do with traditional money you will able to do with digital assets. This idea is supported, among others, by the co-founder of TechCrunch Keith Teare and over 400,000 registered users, and the number is growing by day.

The team is led by former General Manager of Visa Central amp; Eastern Europe Steven Parker, and C-level executives from global financial institutions, like Renaissance Insurance, London Derivatives Exchange, American Express etc.

Join our Telegram news channel or other social media to stay updated!



Was this article helpful?