Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

Unisys' invisibility cloak for network traffic

Accepted submission by AnonTechie at 2014-05-05 13:14:54
Security
Unisys unveils invisibility cloak for network traffic.

If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

Stealth has been around since 2005, when it was developed exclusively for the Defense Department, which remains one of its largest customers. Several years ago Unisys took it to commercial enterprises and has paid for various independent tests to try to compromise the system, all of which have failed. This is because Stealth uses four layers of security: each packet is encrypted with AES256, then split into three separate pieces and dispersed across the network, destined for a particular group of users that have to be running its protocols. To deploy Stealth, you create virtual "communities of interest" that tie two or more PCs together in such a way that they can only communicate with each other. No one else can join in, and no one else can intercept the traffic.

http://www.computerworld.com/s/article/9248108/Uni sys_unveils_invisibility_cloak_for_network_traffic [computerworld.com]

Original Submission