Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 9 submissions in the queue.
posted by girlwhowaspluggedout on Monday March 03 2014, @02:30PM   Printer-friendly
from the god-himself-could-not-sink-this-ship dept.

AnonTechie writes:

"Intel's Reliance Point is a research project with a daunting task - a leak-proof Big Data sharing solution for business collaboration.

The chipmaker, says The MIT Technology Review, 'thinks it has a way to let valuable data be combined and analyzed without endangering anyone's privacy. Its researchers are testing a super-secure data locker where a company could combine its sensitive data with that from another party without either side risking that raw information being seen or stolen.' The system's inner workings are based on a series of security checks, from the BIOS on up:

When the Reliance Point system boots up, a security chip is used to check that the BIOS, the lowest-level software on a computer that starts it up, hasn't been tampered with. The BIOS then makes its own checks before activating the next level of software, which in turn makes its own checks, a chain-like process that continues until the system is fully operational.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by irick on Monday March 03 2014, @04:42PM

    by irick (3441) on Monday March 03 2014, @04:42PM (#10106)

    Just how the dialog has changed with these sort of marketing materials. This recent shift in focus on cryptography and data security seems to be compelling people to spin their products to this point. TFA is definitely put in the context of a big data customer with an already huge database of customer personal information. The focus is on how it can maintain the integrity of their proprietary information and give them an easy way to increase the utility of that asset while conforming to applicable laws.

    It's interesting how these laws are presented in the article. They are a problem that Intel is working to address rather than a set of protections. TFA gives an interesting look at this sort of mentality, at least given my personal inclinations toward personal data privacy. I enjoyed the moment of insight on the other side of the equation.

    Starting Score:    1  point
    Moderation   +2  
       Interesting=2, Total=2
    Extra 'Interesting' Modifier   0  

    Total Score:   3