adplus-dvertising
Connect with us

Tech

EU proposes new rules to make phones and tablets last longer – Yahoo Canada Shine On

Published

 on


The legislative arm of the European Union has proposed new rules for mobile phone and tablet reparability. It says manufacturers should make at least 15 components available for at least five years after they release a new phone in the EU. Within that timespan, consumers would be able to replace parts such as batteries, displays, chargers, back covers and SIM and memory card trays, as The Verge notes.

The European Commission is also eyeing improvements to battery durability. It says that phone and tablet batteries should be able to endure at least 500 full charges before dropping below 83 percent of their capacity. Under the proposed regulations, phones would need to have a label detailing information like battery endurance, as well as drop and water resistance ratings.

The idea, as the Financial Times points out, is to reduce e-waste and the environmental impacts of phones and tables. According to a study, increasing smartphone life cycles by five years would equate to taking around 5 million cars off of roads in terms of emissions. The proposal suggests that making phones and tablets more recyclable and repairable would reduce energy consumption costs associated with their manufacture and use by a third.

300x250x1

Smartphone makers have hit back against some elements of the rules by claiming that greater availability of parts will increase plastic consumption. “A potential overproduction, subsequent warehousing and destruction of spare parts will naturally result in wasted resources, reduced material efficiency and negative economic value ultimately resulting in higher costs for the consumer,” Digital Europe, an organization that represents tech companies and trade groups, said.

Nevertheless, some phone manufacturers are attempting to get ahead of such regulations by offering consumers components and tools to self-repair their devices. Apple, Google and Samsung have all started selling parts for phones and other products.

The proposed rules would also impact software updates. Manufacturers would need to keep providing security updates for five years after they stop selling a device and provide functionality updates for at least three years.

Back in June, the EC announced a directive for USB-C to become the charging standard for most electronic devices, including all phones, by fall 2024. Some tech companies had long opposed such a move, particularly Apple, which uses the proprietary Lightning charger for many of its portable devices.

Adblock test (Why?)

728x90x4

Source link

Continue Reading

Tech

Protecting APIs in Financial Services with Zero Trust Overlay Mesh Networks – InfoQ.com

Published

 on


Transcript

Dovholuk: We’re going to talk about protecting financial services, but we’re going to use the zero-trust overlay to do that. Usually, when I talk to people, and I say we’re going to talk about zero trust, this is what happens. Everybody is like, “I have heard everything there is about zero trust. I’m tired of it.” It’s a terrible term. It’s been abused. It’s been reused. Really, when it comes to zero trust, I think of explicit trust. What we’re doing is we really want to know who it is, is connecting to our APIs, who it is, is connecting to our services. We need to know the exact identity. Zero trust, terrible term. Why is zero trust important? Anybody see this? This came out, and my marketing guy said, “Look at this, CISA has banned remote management of network devices, unless they’re only accessible from the internet if they implement a zero-trust architecture.”

This is a guy named Philip. Philip said to me something that I’ll never forget. He said, developers don’t care about security. Why is it developers don’t care about security? Philip is not alone. If you go to Google and type it in, you’re going to see, why don’t developers care about security? Why don’t they prioritize security? You find it all over the place. I think we all know, we all care about security. It’s just, we’re busy doing other things. We’re busy actually producing products, filling up features, and completing actual tasks marked in our Jira board. Joel Spolsky, founder of Stack Overflow has a fantastic quote, “Shipping is a feature, your product must have this feature.” Don’t spend time gold plating everything, you’ve got to ship. Security is the same way. Security is also a feature, you need to start thinking of security as a feature. If you’re a VP of engineering, if you’re a product manager, product owner, give time to security, let your developers create a better, more secure infrastructure. Obviously, in the FinTech world, even more important. I am a FinTech user, I want my applications secure.

Current Network Security Setup

This is an overview of current network security. You’re going to see the classic wall and moat. Once you get behind the wall, once you get over the moat, you’re safe and secure, you are trusted. Ten years ago, 15 years ago, we were doing this all without TLS. We said, that’s fine. HTTP, FTP, whatever, nobody is going to be on my internal network. It’s safe and secure. Today, TLS everywhere, let’s start SCP, let’s stop HTTPS. Then developers we’re, “It’s hard.” How can we cert? What are we going to cert from? It’s a pain in the butt.

300x250x1

HTTPS Everywhere was out there. For all my mothers out there, I use the my mother rule, “If my mother can do it, then a user can do it.” HTTPS Everywhere was really cool. It was a plugin you would install on your browser. It would automatically upgrade you from HTTP to HTTPS. Such a good idea. Every browser does this now, and the Electronic Frontier Foundation got rid of it. Let’s Encrypt, also really important. Let’s Encrypt made certificates easy to obtain for all of us, legitimate third party, verifiable CAs, shipped with your operating system. Now you can use those, thankfully, due to Let’s Encrypt. Two more projects doing some interesting things, which we’ll talk about: SPIFFE/SPIRE and OpenZiti. I work for OpenZiti, but it’s an open source project, totally open source, totally free. SPIRE is interesting, because it’s a Cloud Native Computing Foundation project, and it’s graduated. Not too many of those. Guarantee you’ve heard of all of them. Kubernetes, Prometheus, you name it, there’s a bunch of them.

Overview of Zero Trust

This is what we’re going to talk about. Overview of zero trust, again. Here are some of the really important pillars of zero trust I find most relevant to this talk. The most important one is device identity. Device identity is really nice. It’s about having a strong identity deployed on every single device in your network. Then your network can make decisions based on that strong identity. Let’s take that one step further and go to workload identity. Workload fancy term for just some program running somewhere. Generally, you think of workloads running in Kubernetes, or something like lambda, some serverless type of thing. It’s just some idea of some process running somewhere. What’s really nice is now you can have many of these identities all on one machine, all local. You don’t have to have a single device identity. You can have multiple identities. Least-privilege, very important pillar of zero trust, since this says, the network knows that strong identity will not permit a nefarious attacker who gets compromised. We were talking about USBs before, don’t plug somebody’s USB into your laptop, you never know, or even cables now. If they’re not able to communicate to the target of opportunity, they can’t communicate to that target of opportunity. Continuous authorization or posture checking, here you want to make sure, “We checked it once, but did it change?” You want to know, are you on the latest patch? You want to know, do you have a certain process, usually a virus scanner running, that sort of thing. Or you want to have short-lived certificates. This is the longest path that a human can walk across the earth. This is your journey to application embedded zero trust. You’re not going to start from point A to point B, you’re going to get there after a long time. Don’t be afraid if you stop in Egypt somewhere, or you go all the way off to the Pacific Ocean. It’s a journey. It’ll take a while. Application embedded zero trust, we’ll see that in action. Hopefully, I’ll convince you that this is not just some myth and you could do it too.

Introducing SPIRE: The SPIFFE Runtime Environment

First, we’re going to look at SPIRE or SPIFFE/SPIRE. You’ll see these two words used a lot. They’re open source projects. You can go out there, get all this stuff for free. It’s a universal identity control plane for distributed systems. Radia was talking about identity. SPIFFE/SPIRE is a runtime implementation of SPIFFE looking to solve the hard process of delivering identity to workloads, to users. If you go out and look at their website, they’ll say one thing, securing microservices. Authenticating to common databases. These are all the common use cases you’re going to want: mutual TLS, strong identity for securing your APIs. SPIFFE is a set of specifications only. Here are the specifications. You can go out to that big long URL and find them or you can just go out and type SPIFFE. A few of them are important to us: the SPIFFE ID, the SVIDs, the Workload Endpoint. Those are specifications, they’re very attainable. Usually you go out, you read an RFC, and your eyes roll back in your head and you’re like, I got to click 85 other links to go through all these things. Very easy to read these specifications. I even did it. SPIFFE ID is interesting, SVIDs, we’ll see. SPIFFE ID is just a unique string. It’s the way that you identify an identity. It’ll start with SPIFFE:// and then have a trust domain associated to it. Then whatever you want after that. SVIDs, Secure Verifiable Identity Documents, basically cryptographically verifiable identities. Usually comes in the form nowadays of X.509, which is a certificate, PKI we’ve probably all heard about, and JWTs. JWT is signed document, comes in three parts.

Here’s an overview what SPIRE looks like. You’re going to have a SPIRE server, SPIRE agent and workloads. That SPIRE server is going to do one thing, it’s going to talk to the SPIRE agent, while the agent is going to talk to the SPIRE server. It does that for this one thing called node attestation. Very important. I actually heard a lady from Google talking about attestations of software during the build process, same idea. This is node attestation. It’s basically saying, is this node who I think it is? It’s all back to bootstrapping trust. The SPIRE agent needs to present something to the SPIRE server, that SPIRE server can say, yes, I verify that. SPIRE agents and workloads also do workload attestation, same thing but slightly different. In the example I’m going to show you, the workload attestation is performed by the agent itself. The workload will come online, talk to the agent, and the agent will introspect something into that workload that just came online and make a decision about the workload’s attestation and what it is able to present itself as, what its identity is. SPIRE server, few little tidbits that are relevant: the address port, the trust domain. Address and port on the underlay. Underlay an important term to remember. I’ll use the word underlay and overlay throughout. Underlay means IP address, usually. TTL is time to live. It’s how long you let something live for. Plugins, there are some plugins that you configure the SPIRE server with. Datastore. KeyManager, we’re not going to care about. The NodeAttestor we’ll take a look at. SPIRE agent has similar things, has a trust domain, has an address and port it will contact the SPIRE server on. It has this insecure bootstrap that I’m using. Anybody who’s used SPIRE is going to go, “No, he’s used insecure bootstrap.” It’s for demo and there are better ways to do it than use insecure bootstrap. You should try it out because all the code you’re going to see you’re going to be able to get from my GitHub. KeyManager, NodeAttestor, WorkloadAttestor. NodeAttestor, WorkloadAttestor are important for agents, and we’ll see those here too.

Introducing OpenZiti: Full Zero Trust Overlay Network+

We’re going to flip modes and we’re going to talk about OpenZiti. SPIRE is about delivering identities. OpenZiti is the zero-trust overlay mesh network that I work on. I’m actually a committer on the project, I’m not just a figurehead. What is an overlay network? Usually, you think of an overlay network as, you need some network so it’s most advantageous to deploy your overlay right on the open internet. You don’t have to. If you have a private network, you can use a private network too. OpenZiti will actually also install into an air-gapped environment. You can bring it someplace entirely secure. We’ll just call that our Ziti Overlay Network. We’ll put a controller on that, the controller’s job is to do authentication, authorization. When something connects to the controller, it will determine its authenticity, similar that the SPIRE server does. We’ll have some edge routers, or routers in general. These form your mesh overlay network. They talk to one another, and they talk to the ones that they’re informed to talk to. Then they’ll also talk to the controller. They’ll do that all through mutual TLS, and OpenZiti will bootstrap all of this on your behalf. That’s all done for the explicit purpose of having an edge on the left-hand side, an edge client talking to an API so that we can send data. My favorite feature of OpenZiti and the zero-trust overlay, is your server, if it has OpenZiti installed in it, has no listening ports. How is that? It’s crazy. We’ll see how that works.

Zero trust network access, this is what most people think of when they think about zero trust. I trust my private network, it’s fine. Never going to get compromised, no problems, HTTP. Obviously, it’s not great, because we have some trusted network on the left, we have some trusted network on the right, we have some targets of opportunity if we’re able to land and expand. Next level, scaling up zero trust host access. Here, you take an agent, and you install it on that local machine, and that local agent is able to intercept traffic locally, keeping it only on your host operating system, or Kubernetes, or whatever. Then teleporting it wherever you want it to go to, to the other side, and the other side could be configured to offload to localhost or a 127, something non-routable. Then you know for sure that your traffic will not be traversing a network. Application access, here’s where you take an SDK and you actually stuff it into your application, you compile it in, or there are ways to post to do it. LD_PRELOAD trick from Linux lets you basically bootstrap some libraries ahead of time. That’s probably considered application embedded too, because it’s entirely in your runtime, in your environment, in your application. All the way to the server where the server has no listening ports, and so that’s called application access. I call it zero trust application access. Then if you have a hardware root trust, you can take that one step further, get a YubiKey or something along those lines, maybe a TPM, and do your cryptography outside of the operating system itself, so like a YubiKey, for example. Now you still have a little bit of trust, because you trust some parts of the operating system.

Example Code

Let’s look at the nerd stuff now, let’s look at code. Here is where you can get the source, https://github.com/dovholuknf/qcon2023. That’s where all the source code will live. It works on Linux. SPIRE doesn’t have a Mac client, so I couldn’t do it in Mac. If you run a virtual machine, or if you’re on Windows, use WSL, and that’s where I’ll be doing. I’m going to blast through the nosecurity example. This is just a baseline, what we’re going to do. We’re going to have a nosecurity server, and we’re going to have a nosecurity client. We’re going to turn it on, and then we’re going to talk to each other. I’m going to use Go, so you’ll see Go used here. What you can see is like on line five there, we’re serving no TLS. In Go, you can serve or you can serve TLS, either way, and so we’re going to do no TLS because this has no security. We’re going to create a server on top. We’re going to create an underlay listener on some port and that’s going to be our whole first demo. That’s what we’re going to do. Go has a bunch of imports, has a bunch of constants, you can check these out. Important one here is maybe the SocketPath, you can see that’s where the domain socket that your code will actually contact the agent on. A couple of SPIFFE IDs, we’re going to make a JWT client, a JWT server. JWT will come in later on, and a few ports that we’ll just open up. Make a server, handle the server, basic Go code. Again, very approachable, simple code, you can take this and try it at home. Creating an underlay listener, all this is standard library stuff, piece of cake. Then more standard library stuff. I wrote a simple math API. Our API we’re going to be securing, is just going to operate on two inputs, input1, input2, and then take some operator and work on it. Here is what our insecure client looks like. It’s going to create a mathUrl, add the math parameters, they’re going to be query parameters. You can just use your browser if you wanted to. We’re actually going to use curl, because if you parse the fourth argument, you will see the equivalent curl statement. That’ll come up later, because I want to prove there’s no smoking mirrors, so we’re going to use a third-party app in order to use that curl. Create the mathUrl, add the math parameters. I’m just going to blow through all this, call the API. Important part about calling the API, we’re using the default HTTP client from Go, which is nice, because once you secure the default HTTP client, every request through the Go runtime will have the security applied to it.

If you look right here, I’ve already run all this stuff. It’ll start up Docker. It’ll start up a zero-trust overlay network for you, OpenZiti network for you. It’ll download bootstrap and install SPIRE, the SPIRE agent, the SPIRE server. It’ll do all that stuff for you. It’ll configure your zero-trust overlay network. If you want to inspect all this stuff, you can go ahead and inspect all of that stuff. Run the server. You see, I’m just going to multiply 10 times 2. If you’re running on Linux, make sure you quote that, otherwise you’ll glob and have a bad time. You’ll get a result of 20. That’s what we would expect to see from our math service. If curl will help me out, I can run curl2, runs in the subshell because the API doesn’t have a new line at the end, so I got to echo it till I get a new line. That’s why it’s wrapped in a subshell. We haven’t done a darn thing to make this thing secure yet, so let’s do that. Secured by SPIRE. We’ll start with SPIRE. We’re going to take that 18080 port, no TLS, and we’re going to turn it into a mutually secured TLS endpoint, all in an hour. We already have our SPIRE server running. We already have our SPIRE agent running. That SPIRE agent needed to be configured, and the server needs to be configured too. When you look at that big, long script of bash that runs, you’ll see the important parts here are the bind address that binds on all interfaces, because I don’t know what your IP is. Then whatever your bind port is, this case, 8600, that’s where SPIRE server will be contacted on. We’re going to create a trust domain. We’re going to configure SPIRE with a JWT issuer, so that the OpenZiti runtime when we get there will know who issued the identity.

Important part of the server configuration, that NodeAttestor, we’re going to use the join_token plugin. If you look at the plugins that SPIRE supports, there’s a bunch of them. There’s AWS, GCP, Kubernetes is a big one. You’ll find SPIRE in Kubernetes a lot. Pay attention when you go to the doc, there’s the doc page, because there are server NodeAttestors, and there are agent NodeAttestors, and if you confuse the two, you will be quite confused as to why your configuration is not working and why SPIRE is crashing on you. We’re going to use the join_token. It’s the simplest example, but there are many examples that you can pull from. The agent is going to be configured similarly. We’ll tell it what its trust domain is, where to contact the SPIRE server, what port, and then that insecure bootstrap I mentioned before. Then, also, to configure the join_token in the SPIRE agent, so that when the SPIRE agent comes online, it can present that token back. Then we’re going to use the WorkloadAttestor of Unix. This is really cool. Also, discover workload path equals true. What that will do is it will actually inspect the path of the runtime that’s running, and based on where the path is, it will give you a certain kind of identity. When you try to debug this, if you try to run the server and the client as you, you’ll get the same identity. That’s not what you want. You want two different identities. Again, we’re going to use the join_token NodeAttestor. You can read all about these things, a bunch of agent NodeAttestors to pull from too.

We configured a SPIRE server by generating a token, we gave it the SPIFFE ID that we want it to be known by. That says, ok, this is the token to use, present this token back to me. Then when we run the SPIRE agent, we’ll use that particular token, and that’s how trust is bootstrapped. There are better mechanisms, again, only an hour. Now we’ve got a SPIFFE ID on our agent, we’ve got a listening 8600, and we’ve got a SPIRE server working. Now we’re going to go through the code to authorize those workloads. Again, that’s our goal, so that we can have a client SVID, a SPIFFE Verifiable Identity Document presented from the client to the server, and the server back again, all for the purpose of mutual TLS. Because if either of them don’t match up, you’re having no access, very important. We go through SPIRE server. We create an entry, we’re going to give it a JWT server as the SPIFFE ID, tell it where the parent is. Basically, this homes the identity to that particular agent. You can add DNS options as well to it, which is neat. If you want that server to be known by a certain DNS name, or name server entry, you can do it that way. Also, you can use top-level domains that don’t exist like .ziti. Then we’re going to use that cool Unix path selector to actually select the SPIRE server based on its path. When you run compile and run, it will come down and it will put that file in that exact location in your /temp folder. We’re then going to use the Unix WorkloadAttestor. It’s an eye chart, there we go. In the Unix path, you can choose what the Unix path is. There are lots of selectors that you can give SPIRE this information to, one of which, for example, is the SHA-256. If you know the exact path and you know the exact SHA, you can give those two selectors to SPIRE, and SPIRE can make a better decision about whether or not that identity is the one it’s supposed to be.

Now we have the server side working, now we’re going to look at some client-side code. Here’s what the code used to look like. There’s what the code looks like now. We haven’t added a bunch of lines of code. I’m going to hand wave a little bit, because there’s a couple of functions in here that I made, but we’ll see those. We create that server, again. We set up some options, which only go through to tell your runtime where to find the SPIRE agent. Then we configure that runtime for mutual TLS. We pass the HTTP server to a function I wrote called configure for mutual TLS. That’s all for the explicit purpose of serving TLS. Now we have TLS delivered, which is nice. As a developer, what have I done? I’ve added 50 lines of code maybe. Here’s what configure for mutual TLS looks like. It just calls workloadapi, which is a Go SPIFFE library. I don’t know if they have Python and all kinds of other libraries, I just use Go. Then it will call client RequireFromString, so you give it a SPIFFE string, a SPIFFE ID string. It says, now this is a SPIFFE ID. Then important down there, configure mutual TLS server config, TLS authorize ID of client ID. Only SPIFFE IDs that show up with that SPIFFE ID, only clients that show up with a certificate that is of that SPIFFE ID can actually contact and communicate to your service. Then you configure the server and you’re done, and now we’re serving TLS. Client looks almost the same. We’re going to make the mathUrl, but this time we’re going to use a secure port, so that way we don’t have port conflicts. We’re going to use HTTPS instead of HTTP, still listening on localhost, localhost. Set up at options. Then we’ll make this big long function. Go usually likes short functions, but I want one that actually makes sense, so SecureDefaultHttpClientWithSpireMTLS. That’s what that looks like. Also, 15 lines of real code here. Anybody who’s looked at Go knows the if error pattern. This creates a mutual TLS transport, and then a X.509 source is added to that transport in order to configure the whole thing for TLS. We’re going to look at that code later if we want.

In order to have SPIFFE servers, SPIFFE client, all be mutual TLS, so now we should be able to see this happen. Run the server. We obviously should get the same results, so it shouldn’t be all that spectacular. One of the things that is neat is if you look at the curl down here, notice I had to add a cert and a key to my curl. Let me run that curl statement, and we’ll see what happens if I run it. It should succeed. It does succeed, great. If we come up, and we delete off the cert, and make sure we’re not playing any games here, delete. We get no result. Also, notice that the server tells you, “That client did not provide a certificate.” Pretty cool, server has already authenticated your client, 50 lines of legitimate code. You would have to write that code in order to secure your services with mutual TLS with SPIRE.

What do we do? We deployed a SPIRE server, we deployed a SPIRE agent, modified three lines of the server code, five lines of the client-side code, and we added mutual TLS to our solution. We have end-to-end encryption. Because it’s mutual TLS, you know that the server is actually the one that is presenting that SPIFFE ID. HTTP got to be a little careful, because there are some tricks that you could play in there, and somebody else could obtain your certificate if they had a valid SPIFFE ID, but let’s assume that they don’t. You got end-to-end encryption. You have implicit attestation by having the SPIRE agent deliver that certificate to the client and to the server, which for me as a developer was the best part, or mutual TLS was maybe the best part. I got that basically for free. I have short-lived automatic cert rotation, all by just doing that. That’s pretty cool stuff.

Server Secured by OpenZiti

We’re going to look at the same sort of thing but with OpenZiti. OpenZiti, same sort of setup. What we’ll have is we’ll have a router in play, that middle thing, and we’ll have a controller in play. That’ll be useful because the router is what’s going to have a listening port, the server application will not have a listening port. If you put that router somewhere in the cloud, nobody would ever know that you were talking locally to a service that was running here talking to here, because it goes up and through that router in the sky, or a local or whatever. Controller is also available for authorization and authentication.

OpenZiti has a bootstrapping trust process, it looks like this. Now we’re going to actually configure the OpenZiti overlay. To do that, we’re going to use a JWT. Here in Ziti land, we’re going to create an external JWT signer. That external JWT signer will have a JWKS endpoint, that’s how Ziti is going to be able to validate the JWT that is provided back to OpenZiti in order to prove that connection’s identity. It’s going to also require an audience. The JWT spec says, if you’re sending this to somebody else for verification, the audience should be filled in. If you don’t fill in the audience, then you must reject the JWT. You need to fill out that audience, and that’s where the audience comes from. Once we have an external JWT signer created, we’re then going to associate that signer to an authentication policy. Very flexible. OpenZiti is structured so you can have multiple authentication policies. In this case, we’re going to say the primary authentication that is allowed is a JWT, so when the JWT shows up, what’s the signer that’s going to be used by? Use that signer, use that JWKS endpoint, verify that JWT. We’re then going to make more identities. These are OpenZiti identities, and so those identities are part of the overlay network itself. We’re going to associate the external ID, that SPIFFE ID to each identity, and we’re going to make an authentication policy, it’s associated to the identity as well. Again, very flexible. Now those identities can be verified by JWTs, specified and provided by SPIRE. That’s what we’ll see.

We’ll set up some configuration stuff, this is OpenZiti-ism, it’s got an intercept involved. Also notice, cool part of OpenZiti, totally fabricated DNS names. You can have totally private DNS. Openziti.ziti is what I’m going to use. Then we’re going to make one for SPIRE and OpenZiti. Then we’ll see OpenZiti and SPIRE together, also totally fabricated DNS. Then, OpenZiti, one more layer of security, you have to authorize these identities for which services they’re able to talk to. The demo services are going to be able to be bound or served by demo servers. The clients will be bound or served by demo clients. Client code, this is what it used to look like, here’s what it looks like now. Not a whole lot more code, same sort of thing. This time, what’s different is we’re going to fetch a JWT from SPIRE. Now SPIRE is providing the JWT for OpenZiti. OpenZiti will then create an overlay listener or an OpenZiti listener. That’s nice because we’ll have no port, but we’re going to serve. Where’s our TLS? That’s cool. Don’t worry about it. OpenZiti provides end-to-end encryption, so you don’t need to serve TLS. You can if you want to, but you don’t have to. You still have end-to-end encryption, it’s not mutual TLS: kind of the same, kind of different. The client looks very similar. We have the workloadapi, WithClientOptions. We have the CreateMathUrl. The client also fetches a JWT and uses that JWT to secure itself. Still listening on HTTP, but it’s cool because we have end-to-end encryption. Then also notice, totally fabricated URL, I made up openziti.ziti.

If we go in here, and we look at the JWT, where it’s used, you’ll see that it’s used in here, when we create a ZitifiedTransport, which is all an SDK option that you would get from OpenZiti. Here, we’re making our new credentials, we’re pulling down our CA pool, or you can provide your own CA pool if that’s what you prefer. Then we’ll use all those things in order to authenticate. We’ll do a context authenticate. Then the ziti.DefaultClientCollection.Add, that’s the magic that lets the default HTTP client find openziti.ziti, and pass that traffic properly. Then we’ll make a ZitifiedTransport, and associate that transport to the HTTP server. That’s what we’ll end up doing. We’ll see that in action, too. There’s an important point in here, and we’ll see this happen. Of course, you notice it’ll actually work without OpenZiti. If you want it to work, you need to provision that identity. We have that server running. If I do an ss -lntp, and pipe that to grep for 18000 and something. I’m going to do a sudo on this too. It’s not 18082, which is what the port’s supposed to be. That’s a whole different server that’s running. It’s not running on 18082. There’s actually no server running. Down here, if I try to do this curl, which it says, of course you know this will not work. This actually will not work, there is nothing to respond to. What I can do instead is I can go back over to my OpenZiti tunneler, which is a client that is used to get yourself onto the OpenZiti overlay if you are not application embedded, then I can add an identity. Hopefully, it hasn’t timed out. That’s over here. You’re calling temp local Docker user. When that’s done, I should see a local Docker user, and it’s got two services. Now my curl statement, it works. Now I’m demonstrating that zero trust host access. On the host side, my client side, I have a tunneler that is allowing me to tunnel across, in this case, locally, to my server, which has no listening ports. No listening ports, that’s amazing. There’s our demo. Now we have no listening ports.

Questions and Answers

Participant: Really big messages, big work, so everything has to go through the tunnel?

Dovholuk: Everything has to go through the tunnel in this zero-trust overlay network.

Participant: That would mean more [inaudible 00:33:50], latency.

Dovholuk: It definitely is going to impact your latency. On top of that, end-to-end encryption is going to add yet more latency. Sometimes I know, some FinTech stuff doesn’t even use TLS anymore. It’s just a trusted network, and that’s how it’s going to be. That’s not the place to port OpenZiti in. OpenZiti is where you can’t allow for a device or a service to become compromised through side channel attacks, Log4Shell type stuff. That’s where OpenZiti is much more important. Your phone app that goes from your phone to wherever the server is, it takes your application entirely offline, can’t be DoSed, that sort of stuff.

No listening ports is my favorite piece of OpenZiti. Ubiquitous connectivity is another amazing feature of this. You have basically an invisible tunnel that goes from wherever to wherever. I’ve run Kubernetes minikube on my local computer, and given somebody an identity and had them connect to my minikube from their house, all without exposing any ports through my own firewall. That stuff is crazy. The key here is we’re also authorizing before connecting. Before, every time I did a mutual TLS connection, the server noticed and responded and said, no, it didn’t work. If there happens to be a zero day or something goes wrong with that, you could have potential problems there. Log4Shell was one of the ones that was relatively impacted by that sort of zero day. Now you’re authorizing before connect. You can’t even send packets to the destination server without showing up onto the OpenZiti overlay network, without being authorized, without being authenticated as well. Authentication is not sufficient, you must also be authorized. That’s the OpenZiti demo I can give.

The cool thing about the demo is obviously with mutual TLS, you can add mutual TLS to your particular solution, as well as OpenZiti, so you can have mutual TLS provide its identity from SPIRE, as well as OpenZiti overlay network providing your authorize before connect, and giving the best of both worlds, if that’s the sort of thing that you’re into.

You can go out and learn about SPIRE and SPIFFE at spiffe.io. It’s also on GitHub. Openziti.io also brings you there, github.com/openziti/ziti.

There’s some cool other tech that OpenZiti produces called BrowZer. It’s like dripping wet type stuff. If you were to go to this URL and plop in your email address, what will happen is I’ll provision an OpenZiti identity using an ngrok. zrok is an ngrok-esque competitor. zrok is very similar to ngrok, it provides very easy access publicly to something that is shared privately. Here, running on my local laptop, that process I had mentioned up at the top right there, is actually the server that will be listening. What will happen is it’ll provision an identity on my OpenZiti overlay, but then uses some new tech called BrowZer. BrowZer is really neat because BrowZer bootstraps zero trust in your actual browser without installing a client, which seems like magic and works like magic. Then, if you do that whole thing, you’ll get the Docker Whale down there, which is running somewhere up in VPC land in Amazon.

See more presentations with transcripts

Adblock test (Why?)

728x90x4

Source link

Continue Reading

Tech

Nothing's Ear and Ear (a) earbuds with active noise cancellation are now available for pre-order – Engadget

Published

 on


Carl Pei’s Nothing has revealed two new wireless earbuds at an event in Tokyo. It calls the Ear, the more expensive model of the two with prices starting at $149 and £129, a refinement of its older model the Ear (2). The Ear retains the brand’s transparent design and looks very similar to the previous model. But it’s powered by a new custom 11 mm dynamic driver and comes with a dual chamber design that allows it to deliver clearer sounds compared to its predecessor.

It also features a new smart active noise cancellation (ANC) algorithm that can check for noise leakage between the earbuds and the ear canal and then add more noise cancellation accordingly. Plus, it can automatically apply the level of noise cancellation needed — high, medium or low — appropriate for the environment the user is in. Nothing says the model’s noise cancellation rated at 45 dB is almost twice that of the Ear (2), as well.

When it comes to battery life, the Ear’s was also designed to last longer. It can last for up to 40-and-a-half hours after a full charge with its charging case, or up to eight-and-a-half hours of non-stop playback. In addition, the model comes with a new mic that enables less obstruction and interference, support for LHDC 5.0 and LDAC codec for high-resolution streaming over Bluetooth and the ability to quickly switch between connected devices.

300x250x1
Yellow earbuds.

Nothing

Meanwhile, the Ear (a) is the more fun and more affordable model between the two new releases. It’s the first Nothing model that isn’t just black or white — though those colors are also available — with one version’s non-transparent parts and case colored in vivid egg yolk-yellow. Even though its prices start lower than the Ear at $99 and £99, it also features the same ANC technology and the brand’s new smart ANC algorithm that can check for sound leakages. It even supposedly has a better battery life than its more expensive sibling and can last for up to 42-and-a-half hours of music playback after a full charge with its charging case.

Both Ear and Ear (a) are now available for pre-order from Nothing’s website. They’ll start making their way to buyers and will be available for general purchase on April 22.

Adblock test (Why?)

728x90x4

Source link

Continue Reading

Tech

Nothing's new earbuds prove that it can (mostly) hang with the heavyweights – The Verge

Published

 on


Nothing is churning out new earbuds at a faster clip than smartphones. The company just introduced the Nothing Ear and Nothing Ear (a), priced at $149 and $99, respectively. Together, they mark Nothing’s fourth and fifth products in the headphone category. First came the original Ear 1, which stood out for its partly transparent design but suffered from bugs and inconsistent audio performance. Then, Nothing went after a different audience with the open-style (and oddly named) Ear Stick. And a year ago, the company shored up reliability and sound quality concerns with the Ear 2. Now it’s back for another go-round. 

And guess what? Yep, they still look pretty much exactly the same.

300x250x1

The Nothing Ear and Ear (a) both preserve the design that debuted in 2021, with the improvements again focused on day-to-day performance. On the flagship Ear buds, the sound profile was tweaked once more and includes new personalization options, and their battery life has been extended by 25 percent. And there’s a new Bass Enhance setting for giving the low end some extra kick when desired. 

A photo of new earbuds from Nothing.

A photo of new earbuds from Nothing.

a:hover]:text-black [&>a:hover]:shadow-underline-black dark:[&>a:hover]:text-gray-e9 dark:[&>a:hover]:shadow-underline-gray-63 [&>a]:shadow-underline-gray-13 dark:[&>a]:shadow-underline-gray-63″>The Nothing Ear (a) earbuds are the company’s first product that isn’t black or white.

Meanwhile, the more affordable Nothing Ear (a) adds a splash of color to a Nothing device for the first time: they’re available in yellow in a hue that’s rather close to the adorable Playdate. But the earbuds themselves look just like the pricier Ears, right down to the components you can see through the transparent part of the stem. And they feel identical to the Ear 2 once you put them in. They’re comfortable, but Nothing only includes three sizes of silicone tips, which doesn’t always cover the full spread of ear sizes.

And the similarities extend to how they function. Both have the same strength of active noise cancellation and are able to muffle out up to 45dB of noise, which is twice what the Ear 2 were capable of. Both pairs of earbuds are IP54 dust and water-resistant, although the Ear’s case is more resilient, with a IP55 rating compared to IPX2 rating for the smaller Ear (a) case. Spending more on the Nothing Ear also nets you wireless charging. But in terms of feel, I prefer the more compact Ear (a) case, which the company says was inspired by “everyday pill packets.” It’s more fun! Nothing has improved voice call performance and AI voice isolation on both sets of buds, as well.

A photo of new earbuds from Nothing.

A photo of new earbuds from Nothing.

a:hover]:text-black [&>a:hover]:shadow-underline-black dark:[&>a:hover]:text-gray-e9 dark:[&>a:hover]:shadow-underline-gray-63 [&>a]:shadow-underline-gray-13 dark:[&>a]:shadow-underline-gray-63″>That yellow really pops.

Where the Nothing Ears win out is in audio fidelity and the level of customization you can apply to it. Nothing says the Ear has its “most advanced” driver system yet, which uses a ceramic diaphragm “rarely seen in audio products” for improved richness. It also partnered with a company called Mimi for a hearing test in the Nothing X app that creates a personal sound profile for your unique hearing traits. I’ve mostly stuck with the “advanced” EQ, which lets you adjust a graphical interface and create profiles for different musical genres. Once the Nothing Ears are out, you’ll be able to share your preferred presets with other owners (and import theirs) by way of QR code. 

A photo of Nothing’s Ear and Ear (a) earbuds side by side in someone’s palm.

A photo of Nothing’s Ear and Ear (a) earbuds side by side in someone’s palm.

a:hover]:text-black [&>a:hover]:shadow-underline-black dark:[&>a:hover]:text-gray-e9 dark:[&>a:hover]:shadow-underline-gray-63 [&>a]:shadow-underline-gray-13 dark:[&>a]:shadow-underline-gray-63″>Color aside, it’s not easy to tell the $149 Nothing Ear (left) apart from the $99 Ear (a).

So far, I’ve been very satisfied by how the Nothing Ears sound. The Ear 2 were already on the mark, so these aren’t too different. Can they compete with every trick that Apple, Samsung, Google, and others are offering? No. There’s no head tracking spatial audio, for example.

But from an audio quality perspective, they’re going toe to toe with earbuds from companies with far more resources. And that’s not to say that the Ear (a) sounds bad by comparison. It’s honestly in the same ballpark, so you’re not sacrificing much if you really want Nothing’s colorful buds.

And you’re still getting multipoint, Fast Pair (for Android), Microsoft Swift Pair, and a low-latency gaming mode in the cheaper buds. That’s a lot of stuff crammed in for $99. Battery life has also been totally sufficient, lasting for over five hours on both buds with ANC enabled or well over eight hours if you can go without it. 

So as it stands right now, both of Nothing’s new earbuds are a very solid value. And they’ll become more capable in the months to come: the company plans to add ChatGPT integration to its smartphones and earbuds, which will let you query the AI through voice when on the move. I think earbuds are a more compelling vehicle for these interactions, so I’m excited to test how it all comes together once that update is available.

Photography by Chris Welch / The Verge

Adblock test (Why?)

728x90x4

Source link

Continue Reading

Trending