Computing Technology

Put it in your pipe and store it – thoughts on data storage

Roelof Temmingh introduced a fascinating idea in his talk on tea at Zacon II yesterday, and I woke up this morning with some free time and an iPad handy, so I decided to explore the concept of using a “series of tubes” as a storage medium a little closer. At this stage it’s just a gathering of thoughts but hopefully I’ll take the time at a later stage to throw some code behind the idea too.

So all around us we have this connectivity between digital devices. These “pipes” take a number of different forms – the interwebs uses mainly copper and fiber, cell phones using allocated GSM spectrum, WiFi and WiMax similarly using “air” as their means of transport, satellite, fibre-attached storage, USB cables, IP over power lines, the list goes on. The important thing here is that when data enters one of these transport mediums it is effectively stored within that medium during transit. It no longer needs to exist at the source or destination, but out of tradition and habit it usually does. A great example of this transitory data storage is cellular voice traffic – it is effectively split into packets which are sent over the “air” as fast as possible, never remaining stationary until they reach the destination where they are effectively “deleted” when they are consumed.

But what if the data being transferred is never allowed to reach a termination point? It could be looped and for as long as the signal stays alive in the medium that data will be stored there. Could it be possible to send a file into GSM spectrum – the air – and keep it there? And what exactly are the data storage limitations of “air”?

Considering this idea was pitched at a security conference, we need to examine how the security and integrity of the data can be maintained in a rather intangible medium. Presumably encryption of the data before transmission solves part of the problem, with hash sums helping out too. But do we need to firewall this? After all, data in transit is ripe for interception – Bug #0 in IT security is the fact that only immovable data can be 100% secure, but data is useless until it is moved. And how do you firewall a copper cable? A GSM signal? Something to think about…

Another good analogy is to think of treating data more like electricity than we traditionally have. Electricity doesn’t get syn/acked to your plug when you switch it on – it’s stored in the medium.

The simplest implementation I can think of is a peer to peer setup, where Alice drops her file onto the wire, with Bob as the “destination” (sorry I’m pissing all over the crypto guys here). But all Bob has is a reflector running which bounces that data straight back at Alice, who in turn has a reflector which pushes it back to Bob again. Introduce more reflector peers as you desire. A lot of Worms succeed by working in similar fashion. Of course Alice needs a way to pull her file back. Some sort of signal can be pushed onto the wire, chasing the file and telling the reflectors to pass it through Alice’s node for a read/write transaction. Each node, whether it be a router or reflector, of course introduces a security risk that needs to be mitigated. (insert previous paragraph on security here)

The problem with the scenario above is that it becomes very easy to saturate a link. Ask any bittorrent user about their experience in destroying someones network. We still need the links to be links – we’re not trying to build copper hard drives here… Contrary to everything previously thought about bandwidth and speed, we could actually have the data moving relatively slowly between nodes, which should reduce the aspect of link saturation.

The principle of data stored in the pipe can also be pretty robust. It aligns itself well with the original premise of a “nuclear-event proof” Internet.

This is also a pretty good covert channel. If I store nothing sensitive on my local machine, but rather push it onto the grid, I can effectively detach myself and a sound infrastructure would guarantee my ability to retrieve that data anywhere in the net. No data would be retrievable even from forensic analysis of my machine (assuming secure practices on my side).

There’s loads more of this concept to explore, but the summary I have so far is:
1. It can be done – it’s actually kind of happening right now.
2. There is a very large, though not infinite, capacity.
3. It can be secured.
4. It can be robust.
5. It’s way more fun than hard drives.

I hope to explore this idea much further. Even if just for shits and giggles.

Your thoughts?

Computing Technology

Social Media Specialists, Whatever…

These two blue tits above give us a great reminder of what you get yourself into when you start looking for a social media specialist. Everyone’s on the bandwagon, so you’re better off approaching the straight-talking technical rockstar, someone with a proven skill, experience, ability and great in-depth knowledge of computing, the internet and all things web 2.0, instead of getting a marketer-turned-so-called-“internet guru” to waste your money for you.

Computing Rants

The Internet will forever suck in South Africa

Internet Bandwidth by World Region

It appears to me that there is no incentive to host any online content in South Africa. Hell, there’s no point hosting anything internet related in the whole of Africa. We’ve lost. We’ve become part of the third world on the Interwebs. The dark continent remains dark in the digital age. Thanks Ivy. Thanks Telkom.

In contrast, tomorrow a 1Gbps (that’s gigabit-per-second!!!) internet service arrives in Japan. for $56 a month (i.e. less than R560/month).

Yes. Let me repeat that. Tomorrow a 1Gbps internet service arrives in Japan. Do you know how fast that is? That’s faster than most corporate LANs! That’s faster than hundreds of business internet connections. South Africa currently has a Total National bandwidth of around 400Gbps. Give or take a few gigs.

Very soon 400 households in Japan will have more internet influence than the whole of South Africa.

Our entire country could be denial-of-serviced off the interwebs by a handful of people in Japan.

Amazon Web Services, here we come. With the pricing structures Amazon (or their competitors) offer, there is absolutely no reason to commission another Internet server in the whole of Africa, ever again.

Yes, of course it’s fucking tragic.

Computing Security Technology

How Vodacom, MTN and iBurst punch (gaping) holes in your corporate security

This week in MyDigitalLife: The hidden risks of mobile data card usage at the office.

Technorati Tags: security, network, 3g, data, access, CEO, vodacom, mtn, iburst, internet, mobile