SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
April 2024
Chris Swan
Engineer
chris@atsign.com
Privacy with
Personal Data
Services
Consumers Want Privacy & Superior Experiences
2
2
Facebook
Friends
Pictures
Videos
Email
Password
Phone number
Personal posts
Google
Search history
Shopping History
Pictures
Videos
Phone number
Email
Password
LinkedIn
Business contacts
Resume
Work history
References
Email
Password
Phone number
Business Posts
Citibank
Checking balance
Savings balance
Investments
Email
Password
Phone number
Verification
questions
Mint
Assets
Checking data
Investments
Savings
Transactions
Email
Password
Amazon
Shopping history
Friends wish
lists
Email
Password
United
Flights
Email
Password
Phone number
Hilton
Hotel history
Email
Password
Phone number eBay
Purchases
Items sold
Credit card
Phone number
Password
Best Buy
Credit card
Type of computer
Computer
accessories
Appliances
Email
Password
Why does
everyone have my
data?
How do I control
this?
Why do I have to
keep entering the
same data again
and again?
Where’s my
password?
Why am I being
followed?
How did they
know I went
there?
3
Framework for E2E encrypted Apps
Apps/Data
Surveillance
Apps/Data/
Surveillance
Centralized/Siloed
Architecture
Apps/Data/
Surveillance
Their data
atProtocol: decentralized &
E2E encrypted
Data
Apps
● True end-to-end encryption
● Personas & Polymorphism
● Shared libraries & data
Update
my data
Data
Apps
Oh look,
Alice
moved!
Alice
app
Bob’s
app
Data about stuff
Alice and Bob each have public and private keys
Alice
app
Bob’s
app
Data about stuff
Public keys need to be exchanged
Alice
app
Bob’s
app
Data about stuff
Introduce personal data stores
Alice
app
Bob’s
app
Data about stuff
Alice
PDS
Bob
PDS
This helps us manage key exchange
Alice
app
Bob’s
app
Data about stuff
Alice
PDS
Bob
PDS
Share different data with different people
Alice
app
Bob’s
app
Data about stuff
Alice
PDS
Bob
PDS
Charlie’s
app
Charlie
PDS
Different data about stuff
Safer & Simpler
• End-to-end encryption
(keys at the edge)
• Fully decentralized
• Devices can cut their own keys
@ alice
Mobile Servers
@ corporation
IoT Device
@ sensor_1
atDirectory
Atsigns
Atsign confidential
@sam1994
@myinstapot02
@samswasher88
@robseclass
@jimmysjeep
@weld192
@weld193
@samsapp1
@samsapp3
@hampton_pad
@glucose_mon5
@sj1_hq
@moo_cow12
2033 - 100 Billion Atsigns
noports.com
atDirectory
Linux machine
Client
No Ports Open
linux_mc
SSH SSH
TCP Rendezvous Server
(RS)
Atsign provides several
regional rendezvous points
rendezvous
outbound
client
outbound
outbound
outbound
Atsign
Control Plane
Transport
Plane
The client which
initiates SSH
outbound
NoPorts is based on Atsign’s
Networking 2.0 Technology
● More secure
● Easy to implement
● Lower overall cost
Services
atProtocol SDKs Directory Optional Hosting
Technology
Use Cases
Safe access into a company
Safe device connection
Safe data exchange with partners
Networking
1.0
Networking
2.0
Comparison
Pro Con
Much more secure
Well Understood
Much easier to
administer
Much less cost
Insecure
Expensive
New Approach
Hard to Administer
IoT Global
Awards
WINNER
2023
IoT Security
Champion
AWARD
WINNER
2022
Future
Digital Awards
FIRST
PLACE
2022
Company Highlights
TMCnet
Cybersecurity
Excellence
WINNER
2023
World
Future Awards
TOP 100
2023
Cloud
Computing
Product of
the Year
2024
1 patent - 5 claims accepted
33 more patent claims pending
Successfully pen tested
Open source
Next generation security
Award Winning Technology
Article
Written By Xose Perez, Rakwireless
“ After all this complexity, there's good news: there is indeed a secure, remote,
and straightforward way to achieve this!
Atsign is a globally distributed company offering networking tools. One of its
projects is SSH No Ports, a connectivity solution with some unique features:
● A directory server (atDirectory) replaces ever-changing IPs with simple,
unique device names known as atSigns.
● The tunnels are only active as needed, with the device primarily waiting for
a request that the directory server has previously validated.
● A rendezvous point (Socket Rendezvous or SR) opens two single-use
sockets, creating isolated secure tunnels from the client to the device.
● Two initial tunnels connect both machines to the rendezvous server upon
request. The keys used for these tunnels are single-use and generated
on-the-fly.
This entire process adheres to a Zero Trust Policy, securing your data
end-to-end with keys stored only on your device and your client.”

Contenu connexe

Similaire à LNETM - Atsign - Privacy with Personal Data Services

AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
TransUnion
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
James Sutter
 

Similaire à LNETM - Atsign - Privacy with Personal Data Services (20)

Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
AWS IoT Innovators Event: Dirk Didascalou Presentation
AWS IoT Innovators Event: Dirk Didascalou PresentationAWS IoT Innovators Event: Dirk Didascalou Presentation
AWS IoT Innovators Event: Dirk Didascalou Presentation
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerO365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
How to Integrate Blockchain Technology into Your Applications
How to Integrate Blockchain Technology into Your ApplicationsHow to Integrate Blockchain Technology into Your Applications
How to Integrate Blockchain Technology into Your Applications
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Developing Trusted Networks with Salesforce Blockchain
Developing Trusted Networks with Salesforce BlockchainDeveloping Trusted Networks with Salesforce Blockchain
Developing Trusted Networks with Salesforce Blockchain
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 

Plus de Chris Swan

Plus de Chris Swan (20)

SOOCon24 - Showing that you care about security - OpenSSF Scorecards
SOOCon24 - Showing that you care about security - OpenSSF ScorecardsSOOCon24 - Showing that you care about security - OpenSSF Scorecards
SOOCon24 - Showing that you care about security - OpenSSF Scorecards
 
All Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdf
All Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdfAll Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdf
All Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdf
 
Fluttercon Berlin 23 - Dart & Flutter on RISC-V
Fluttercon Berlin 23 - Dart & Flutter on RISC-VFluttercon Berlin 23 - Dart & Flutter on RISC-V
Fluttercon Berlin 23 - Dart & Flutter on RISC-V
 
QConNY 2023 - Implementing OSSF Scorecards Across an Organisation
QConNY 2023 - Implementing OSSF Scorecards Across an OrganisationQConNY 2023 - Implementing OSSF Scorecards Across an Organisation
QConNY 2023 - Implementing OSSF Scorecards Across an Organisation
 
Flutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and Flutter
Flutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and FlutterFlutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and Flutter
Flutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and Flutter
 
QConSF 2022 - Backends in Dart
QConSF 2022 - Backends in DartQConSF 2022 - Backends in Dart
QConSF 2022 - Backends in Dart
 
London IoT Meetup Sep 2022 - End to end encrypted IoT
London IoT Meetup Sep 2022 - End to end encrypted IoTLondon IoT Meetup Sep 2022 - End to end encrypted IoT
London IoT Meetup Sep 2022 - End to end encrypted IoT
 
Flutter Vikings 2022 - End to end IoT with Dart and Flutter
Flutter Vikings 2022 - End to end IoT with Dart and FlutterFlutter Vikings 2022 - End to end IoT with Dart and Flutter
Flutter Vikings 2022 - End to end IoT with Dart and Flutter
 
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
 
Devoxx UK 2022 - Application security: What should the attack landscape look ...
Devoxx UK 2022 - Application security: What should the attack landscape look ...Devoxx UK 2022 - Application security: What should the attack landscape look ...
Devoxx UK 2022 - Application security: What should the attack landscape look ...
 
Flutter Festival London 2022 - End to end IoT with Dart and Flutter
Flutter Festival London 2022 - End to end IoT with Dart and FlutterFlutter Festival London 2022 - End to end IoT with Dart and Flutter
Flutter Festival London 2022 - End to end IoT with Dart and Flutter
 
Full Stack Squared 2022 - Power of Open Source
Full Stack Squared 2022   - Power of Open SourceFull Stack Squared 2022   - Power of Open Source
Full Stack Squared 2022 - Power of Open Source
 
Flutter Vikings 2022 - Full Stack Dart
Flutter Vikings 2022  - Full Stack DartFlutter Vikings 2022  - Full Stack Dart
Flutter Vikings 2022 - Full Stack Dart
 
Droidcon London 2021 - Full Stack Dart
Droidcon London 2021   - Full Stack DartDroidcon London 2021   - Full Stack Dart
Droidcon London 2021 - Full Stack Dart
 
Keeping a project going
Keeping a project goingKeeping a project going
Keeping a project going
 
Dart on Arm - Flutter Bangalore June 2021
Dart on Arm - Flutter Bangalore June 2021Dart on Arm - Flutter Bangalore June 2021
Dart on Arm - Flutter Bangalore June 2021
 
TMS9995 on RC2014
TMS9995 on RC2014TMS9995 on RC2014
TMS9995 on RC2014
 
CloudCamp London Nov 2019 Intro
CloudCamp London Nov 2019 IntroCloudCamp London Nov 2019 Intro
CloudCamp London Nov 2019 Intro
 
DevSecOps Days London - Teaching 'Shift Left on Security'
DevSecOps Days London - Teaching 'Shift Left on Security'DevSecOps Days London - Teaching 'Shift Left on Security'
DevSecOps Days London - Teaching 'Shift Left on Security'
 
Cooking with a touch of science and a dash of engineering
Cooking with a touch of science and a dash of engineeringCooking with a touch of science and a dash of engineering
Cooking with a touch of science and a dash of engineering
 

Dernier

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Dernier (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

LNETM - Atsign - Privacy with Personal Data Services

  • 2. Consumers Want Privacy & Superior Experiences 2 2 Facebook Friends Pictures Videos Email Password Phone number Personal posts Google Search history Shopping History Pictures Videos Phone number Email Password LinkedIn Business contacts Resume Work history References Email Password Phone number Business Posts Citibank Checking balance Savings balance Investments Email Password Phone number Verification questions Mint Assets Checking data Investments Savings Transactions Email Password Amazon Shopping history Friends wish lists Email Password United Flights Email Password Phone number Hilton Hotel history Email Password Phone number eBay Purchases Items sold Credit card Phone number Password Best Buy Credit card Type of computer Computer accessories Appliances Email Password Why does everyone have my data? How do I control this? Why do I have to keep entering the same data again and again? Where’s my password? Why am I being followed? How did they know I went there?
  • 3. 3 Framework for E2E encrypted Apps Apps/Data Surveillance Apps/Data/ Surveillance Centralized/Siloed Architecture Apps/Data/ Surveillance Their data atProtocol: decentralized & E2E encrypted Data Apps ● True end-to-end encryption ● Personas & Polymorphism ● Shared libraries & data Update my data Data Apps Oh look, Alice moved!
  • 5. Alice and Bob each have public and private keys Alice app Bob’s app Data about stuff
  • 6. Public keys need to be exchanged Alice app Bob’s app Data about stuff
  • 7. Introduce personal data stores Alice app Bob’s app Data about stuff Alice PDS Bob PDS
  • 8. This helps us manage key exchange Alice app Bob’s app Data about stuff Alice PDS Bob PDS
  • 9. Share different data with different people Alice app Bob’s app Data about stuff Alice PDS Bob PDS Charlie’s app Charlie PDS Different data about stuff
  • 10. Safer & Simpler • End-to-end encryption (keys at the edge) • Fully decentralized • Devices can cut their own keys @ alice Mobile Servers @ corporation IoT Device @ sensor_1 atDirectory Atsigns
  • 12. noports.com atDirectory Linux machine Client No Ports Open linux_mc SSH SSH TCP Rendezvous Server (RS) Atsign provides several regional rendezvous points rendezvous outbound client outbound outbound outbound Atsign Control Plane Transport Plane The client which initiates SSH outbound
  • 13. NoPorts is based on Atsign’s Networking 2.0 Technology ● More secure ● Easy to implement ● Lower overall cost Services atProtocol SDKs Directory Optional Hosting Technology
  • 14. Use Cases Safe access into a company Safe device connection Safe data exchange with partners
  • 15. Networking 1.0 Networking 2.0 Comparison Pro Con Much more secure Well Understood Much easier to administer Much less cost Insecure Expensive New Approach Hard to Administer
  • 16. IoT Global Awards WINNER 2023 IoT Security Champion AWARD WINNER 2022 Future Digital Awards FIRST PLACE 2022 Company Highlights TMCnet Cybersecurity Excellence WINNER 2023 World Future Awards TOP 100 2023 Cloud Computing Product of the Year 2024 1 patent - 5 claims accepted 33 more patent claims pending Successfully pen tested Open source Next generation security Award Winning Technology
  • 17. Article Written By Xose Perez, Rakwireless “ After all this complexity, there's good news: there is indeed a secure, remote, and straightforward way to achieve this! Atsign is a globally distributed company offering networking tools. One of its projects is SSH No Ports, a connectivity solution with some unique features: ● A directory server (atDirectory) replaces ever-changing IPs with simple, unique device names known as atSigns. ● The tunnels are only active as needed, with the device primarily waiting for a request that the directory server has previously validated. ● A rendezvous point (Socket Rendezvous or SR) opens two single-use sockets, creating isolated secure tunnels from the client to the device. ● Two initial tunnels connect both machines to the rendezvous server upon request. The keys used for these tunnels are single-use and generated on-the-fly. This entire process adheres to a Zero Trust Policy, securing your data end-to-end with keys stored only on your device and your client.”