Skip to content

Commit

Permalink
add september blogpost
Browse files Browse the repository at this point in the history
  • Loading branch information
frozenbanana committed Sep 20, 2024
1 parent 1fa726f commit 0c27299
Show file tree
Hide file tree
Showing 4 changed files with 139 additions and 142 deletions.
Binary file added assets/images/the-illusion-of-security.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
142 changes: 0 additions & 142 deletions assets/posts/newsletter_2022-05.md

This file was deleted.

8 changes: 8 additions & 0 deletions blog/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,14 @@
<h1>Posts</h1>
<ul class="posts-list">

<li class="posts-list-item">
<a href="./the-illusion-of-security">
<p>The Illusion of Security | September 2024</p>
<img src="/assets/images/the-illusion-of-security.png" alt="metaprovide logo with mesh background" />
<div>Read</div>
</a>
</li>

<li class="posts-list-item">
<a href="./metaprovide-activity-in-asia">
<p>MetaProvide Activity in Asia | February 2024</p>
Expand Down
131 changes: 131 additions & 0 deletions blog/the-illusion-of-security.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,131 @@
<!DOCTYPE html>
<html lang="en">

<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>The Illusion of Security: Centralised Data in the Modern Age</title>
<meta name="description"
content="Safeguarding sensitive information is paramount. Privacy breaches and data leaks have underscored the importance of robust security measures. If you value data ethics and seek a secure collaboration platform, you'll appreciate the innovative integration of Swarm storage into Nextcloud offered by Platformly. Let’s explore the significance of encryption, introduce Platformly's groundbreaking solution, and highlight its potential to revolutionise your data security. " />
<meta name="robots" content="index, follow" />
<link rel="icon" type="image/x-icon" href="../assets/images/favicon.ico" />
<link rel="stylesheet" href="../assets/styles/util.css" />
<link rel="stylesheet" href="../assets/styles/main.css" />
<style>
.wave svg {
width: calc(148% + 1.6px);
height: 157px;
}
</style>
<!-- Cookie consent managment by Osana -->
<script src="https://cmp.osano.com/16CPXqTjn7XMBxF/5bde6be5-1af9-4cd4-aa09-875fe58b0043/osano.js"></script>
<script src="../assets/javascript/main.js" defer></script>
</head>

<body>
<nav>
<input class="checkbox" type="checkbox" name="" id="" />
<div class="hamburger-lines">
<span class="line line1"></span>
<span class="line line2"></span>
<span class="line line3"></span>
</div>
<div class="logo-wrapper mr-16">
<img src="../assets/images/logos/metaprovide-logo-2024.png" alt="MetaProvide logotype" />
</div>
<ul class="nav-list">
<li class="nav-item"><a href="/">Home</a></li>
<li class="nav-item"><a href="/team">Team</a></li>
<li class="nav-item"><a href="/hejbit">HejBit</a></li>

<li class="nav-item"><a href="/contact">Contact</a></li>

<li class="nav-item"><a href="/blog">Blog</a></li>
</ul>
</nav>
<main>
<h1>The Illusion of Security: Centralised Data in the Modern Age</h1>

<p><img
src="../assets/images/the-illusion-of-security.png" alt="Introduction image of blog post with MetaProvide logo"/>
</p>

<p>In today's digital world, the idea that centralised data is secure is increasingly being questioned. Despite
advancements in cybersecurity, centralising data often creates a single point of vulnerability. The rise in
data breaches, cloud storage failures, unauthorised access incidents, data mining scandals, and policy
changes by third-party providers highlights these inherent risks.</p>

<h2>What is Centralised Data?</h2>

<p>Centralised data typically means a third party controls your data, and not only that it's stored in just one
place. It's often distributed across many servers with redundancies and backups. However, the key issue is
the control and security measures applied by the central authority responsible for "safeguarding" it.</p>

<h2>Data Breaches</h2>

<p>Major data breaches are becoming alarmingly frequent. High-profile incidents like the Equifax breach,
exposing the sensitive information of 147 million people, and the recent <a
href="https://www.securityweek.com/twilio-confirms-data-breach-after-hackers-leak-33m-authy-user-phone-numbers/">Twilio
breach</a>, affecting 33 million users, showcase the significant financial losses and erosion of public
trust that can result from such breaches. This is to be taken seriously.</p>

<h2>Cloud Storage Failures</h2>

<p>Cloud storage is often seen as a secure solution for centralised data. However, failures are not uncommon. In
2019, a misconfigured AWS S3 bucket exposed the personal data of 100 million individuals, highlighting the
vulnerabilities associated with cloud storage. The security of data stored in the cloud is only as strong as
the configurations and measures implemented by the provider. In short, there is much truth in the statement
that the meaning of 'cloud' equals "stored in somebody else's computer".</p>

<h2>Unauthorised Access</h2>

<p>Unauthorized access is another significant threat to centralised data. Even with robust security protocols,
human error or insider threats can lead to breaches. The famous Snowden revelations historically
demonstrated how insiders could exploit their access to gather and leak vast amounts of data, challenging
the notion that centralised data repositories are inherently secure.</p>

<h2>Data Mining and Policy Changes</h2>

<p>The rise of data mining by corporations and policy changes by third-party providers further complicate the
security landscape. Companies like Facebook have faced backlash for data mining practices compromising user
privacy. Additionally, policy changes can retroactively affect data security, as users often have limited
control over how their data is managed once it is centralised. Increasingly, providers are modifying
policies to allow exposure to AI language learning models, posing huge potential risks to organisations
where proprietary data is critical.</p>

<h2>A Decentralised Solution: Introducing HejBit by MetaProvide:</h2>

<p>To address these vulnerabilities, MetaProvide has introduced the HejBit. It works as a plugin for Nextcloud.
This innovative solution allows users to store, share, and collaborate, using files as in a decentralised
Dropbox alternative. Utilising a combination of Nextcloud functionality and the <a
href="https://www.ethswarm.org/">Swarm decentralised data network</a>, organisations can benefit from a
web2 user experience with the security and sovereignty of the highly distributed Swarm network.</p>

<p>HejBit ensures unparalleled data sovereignty by allowing users to own and control their data, safeguarding it
from third-party access and centralised vulnerabilities.</p>

<p>By decentralising data storage, HejBit mitigates the risks associated with centralisation, providing a
profoundly more secure alternative. Users retain absolute control over their information, removing the risk
of unauthorised access and data breaches. Additionally, decentralisation elegantly minimizes the impact of
cloud storage failures and also protects against policy changes by third-party providers, thus ensuring
greater data security and privacy.</p>

<p>Nextcloud users are already familiar with the concept of data sovereignty, often employing self-hosted data
solutions. The HejBit plugin drastically enhances this sovereignty, enabling users to mitigate the risks of
self-hosted server loss, failure, or external shutdown. With HejBit, organisations can make their data truly
unstoppable.</p>

<p>If you are not an existing Nextcloud user we can conveniently guide your organisation to a third-party
Nextcloud solution enabling immediate use of the HejBit decentralisation plugin.</p>
</main>
<footer class="wave">
<a href="../privacy-policy.html">Privacy Policy</a>
<svg data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 1200 120" preserveAspectRatio="none">
<path
d="M985.66,92.83C906.67,72,823.78,31,743.84,14.19c-82.26-17.34-168.06-16.33-250.45.39-57.84,11.73-114,31.07-172,41.86A600.21,600.21,0,0,1,0,27.35V120H1200V95.8C1132.19,118.92,1055.71,111.31,985.66,92.83Z"
class="shape-fill"></path>
</svg>
</footer>
</body>

</html>

0 comments on commit 0c27299

Please sign in to comment.