-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
1fa726f
commit 0c27299
Showing
4 changed files
with
139 additions
and
142 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,131 @@ | ||
<!DOCTYPE html> | ||
<html lang="en"> | ||
|
||
<head> | ||
<meta charset="UTF-8"> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0"> | ||
<title>The Illusion of Security: Centralised Data in the Modern Age</title> | ||
<meta name="description" | ||
content="Safeguarding sensitive information is paramount. Privacy breaches and data leaks have underscored the importance of robust security measures. If you value data ethics and seek a secure collaboration platform, you'll appreciate the innovative integration of Swarm storage into Nextcloud offered by Platformly. Let’s explore the significance of encryption, introduce Platformly's groundbreaking solution, and highlight its potential to revolutionise your data security. " /> | ||
<meta name="robots" content="index, follow" /> | ||
<link rel="icon" type="image/x-icon" href="../assets/images/favicon.ico" /> | ||
<link rel="stylesheet" href="../assets/styles/util.css" /> | ||
<link rel="stylesheet" href="../assets/styles/main.css" /> | ||
<style> | ||
.wave svg { | ||
width: calc(148% + 1.6px); | ||
height: 157px; | ||
} | ||
</style> | ||
<!-- Cookie consent managment by Osana --> | ||
<script src="https://cmp.osano.com/16CPXqTjn7XMBxF/5bde6be5-1af9-4cd4-aa09-875fe58b0043/osano.js"></script> | ||
<script src="../assets/javascript/main.js" defer></script> | ||
</head> | ||
|
||
<body> | ||
<nav> | ||
<input class="checkbox" type="checkbox" name="" id="" /> | ||
<div class="hamburger-lines"> | ||
<span class="line line1"></span> | ||
<span class="line line2"></span> | ||
<span class="line line3"></span> | ||
</div> | ||
<div class="logo-wrapper mr-16"> | ||
<img src="../assets/images/logos/metaprovide-logo-2024.png" alt="MetaProvide logotype" /> | ||
</div> | ||
<ul class="nav-list"> | ||
<li class="nav-item"><a href="/">Home</a></li> | ||
<li class="nav-item"><a href="/team">Team</a></li> | ||
<li class="nav-item"><a href="/hejbit">HejBit</a></li> | ||
|
||
<li class="nav-item"><a href="/contact">Contact</a></li> | ||
|
||
<li class="nav-item"><a href="/blog">Blog</a></li> | ||
</ul> | ||
</nav> | ||
<main> | ||
<h1>The Illusion of Security: Centralised Data in the Modern Age</h1> | ||
|
||
<p><img | ||
src="../assets/images/the-illusion-of-security.png" alt="Introduction image of blog post with MetaProvide logo"/> | ||
</p> | ||
|
||
<p>In today's digital world, the idea that centralised data is secure is increasingly being questioned. Despite | ||
advancements in cybersecurity, centralising data often creates a single point of vulnerability. The rise in | ||
data breaches, cloud storage failures, unauthorised access incidents, data mining scandals, and policy | ||
changes by third-party providers highlights these inherent risks.</p> | ||
|
||
<h2>What is Centralised Data?</h2> | ||
|
||
<p>Centralised data typically means a third party controls your data, and not only that it's stored in just one | ||
place. It's often distributed across many servers with redundancies and backups. However, the key issue is | ||
the control and security measures applied by the central authority responsible for "safeguarding" it.</p> | ||
|
||
<h2>Data Breaches</h2> | ||
|
||
<p>Major data breaches are becoming alarmingly frequent. High-profile incidents like the Equifax breach, | ||
exposing the sensitive information of 147 million people, and the recent <a | ||
href="https://www.securityweek.com/twilio-confirms-data-breach-after-hackers-leak-33m-authy-user-phone-numbers/">Twilio | ||
breach</a>, affecting 33 million users, showcase the significant financial losses and erosion of public | ||
trust that can result from such breaches. This is to be taken seriously.</p> | ||
|
||
<h2>Cloud Storage Failures</h2> | ||
|
||
<p>Cloud storage is often seen as a secure solution for centralised data. However, failures are not uncommon. In | ||
2019, a misconfigured AWS S3 bucket exposed the personal data of 100 million individuals, highlighting the | ||
vulnerabilities associated with cloud storage. The security of data stored in the cloud is only as strong as | ||
the configurations and measures implemented by the provider. In short, there is much truth in the statement | ||
that the meaning of 'cloud' equals "stored in somebody else's computer".</p> | ||
|
||
<h2>Unauthorised Access</h2> | ||
|
||
<p>Unauthorized access is another significant threat to centralised data. Even with robust security protocols, | ||
human error or insider threats can lead to breaches. The famous Snowden revelations historically | ||
demonstrated how insiders could exploit their access to gather and leak vast amounts of data, challenging | ||
the notion that centralised data repositories are inherently secure.</p> | ||
|
||
<h2>Data Mining and Policy Changes</h2> | ||
|
||
<p>The rise of data mining by corporations and policy changes by third-party providers further complicate the | ||
security landscape. Companies like Facebook have faced backlash for data mining practices compromising user | ||
privacy. Additionally, policy changes can retroactively affect data security, as users often have limited | ||
control over how their data is managed once it is centralised. Increasingly, providers are modifying | ||
policies to allow exposure to AI language learning models, posing huge potential risks to organisations | ||
where proprietary data is critical.</p> | ||
|
||
<h2>A Decentralised Solution: Introducing HejBit by MetaProvide:</h2> | ||
|
||
<p>To address these vulnerabilities, MetaProvide has introduced the HejBit. It works as a plugin for Nextcloud. | ||
This innovative solution allows users to store, share, and collaborate, using files as in a decentralised | ||
Dropbox alternative. Utilising a combination of Nextcloud functionality and the <a | ||
href="https://www.ethswarm.org/">Swarm decentralised data network</a>, organisations can benefit from a | ||
web2 user experience with the security and sovereignty of the highly distributed Swarm network.</p> | ||
|
||
<p>HejBit ensures unparalleled data sovereignty by allowing users to own and control their data, safeguarding it | ||
from third-party access and centralised vulnerabilities.</p> | ||
|
||
<p>By decentralising data storage, HejBit mitigates the risks associated with centralisation, providing a | ||
profoundly more secure alternative. Users retain absolute control over their information, removing the risk | ||
of unauthorised access and data breaches. Additionally, decentralisation elegantly minimizes the impact of | ||
cloud storage failures and also protects against policy changes by third-party providers, thus ensuring | ||
greater data security and privacy.</p> | ||
|
||
<p>Nextcloud users are already familiar with the concept of data sovereignty, often employing self-hosted data | ||
solutions. The HejBit plugin drastically enhances this sovereignty, enabling users to mitigate the risks of | ||
self-hosted server loss, failure, or external shutdown. With HejBit, organisations can make their data truly | ||
unstoppable.</p> | ||
|
||
<p>If you are not an existing Nextcloud user we can conveniently guide your organisation to a third-party | ||
Nextcloud solution enabling immediate use of the HejBit decentralisation plugin.</p> | ||
</main> | ||
<footer class="wave"> | ||
<a href="../privacy-policy.html">Privacy Policy</a> | ||
<svg data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 1200 120" preserveAspectRatio="none"> | ||
<path | ||
d="M985.66,92.83C906.67,72,823.78,31,743.84,14.19c-82.26-17.34-168.06-16.33-250.45.39-57.84,11.73-114,31.07-172,41.86A600.21,600.21,0,0,1,0,27.35V120H1200V95.8C1132.19,118.92,1055.71,111.31,985.66,92.83Z" | ||
class="shape-fill"></path> | ||
</svg> | ||
</footer> | ||
</body> | ||
|
||
</html> |