Monday, January 30, 2017

Internet is controlled by 14 people

Internet is controlled by 14 people who keep 7 secret keys

llave-internet

Although it may seem the argument of the last book of Dan Brown, it is a real history. Currently, the Internet is controlled by 14 people who keep 7 secret keys.


In fact, in a few days will be held the ceremony known as Root Signing.

Those who have the privilege of attending this event are people belonging to the Internet Corporation for Assigned Names and Numbers (ICANN), which controls the computers in charge of DNS.

This entity is responsible for the redirection and assignment of address numbers to their servers and websites by translating the first to the web addresses (known by many as URL).

To give you an idea of the importance of this company, we will give you a practical example. Last weekend, a group of hackers decided to make a DDoS attack on Dyn, this DNS provider, which prevented millions of users worldwide from entering Twitter, Amazon or Netflix, among other services.



WHAT IS ICANN?

 

So this Friday the world will remember the importance of the people who belong to this organization.

And it is that the importance of ICANN is transferred to its large database that controls all the servers of the webs.

If anyone could have access to this would be able to change real bank pages for false ones, causing billions of euros in losses.

In short, the Internet would be a nest of dangers difficult to overcome.

For this to happen and thus protect DNS, ICANN has a security mechanism that is based on not giving all power to a single person.



So, select seven people to save one of the seven keys that control the entire Internet. In addition, they have seven other substitutes, in case any incident occurs.

But the key to all this lies in the security ritual that occurs four times a year to generate a new master key. This is just a code that gives access to the ICANN database.

The ceremonies are performed alternately in two different locations so that it does not depend on a single place in case of a natural disaster.

The security to accede to this ceremony passes by access through several security doors through codes and finger readers, until arriving at a room that prevents the electronic communications with the outside.

In addition, this ceremony is audited, recorded and counts with great security, to the point that a document is sent to the participants with all the steps to follow in case of any unforeseen events.

No comments:

Post a Comment