Wednesday, May 26, 2021

The morphing technology protects data network against hackers

Image:https://newatlas.com/computers/morpheus-processor-secure-darpa-hackers/



The engineers have created a microprocessor, which changes its architecture in milliseconds. That thing is protecting it against hackers. In the morphing system is maybe millions of processing units, which are all different type of algorithms and protocols.

The same system, which works in micro-size can also work in the macro world.  But the fact is that the entire network topology can change to morphing. The morphing network changes the IP addresses of the computers randomly, and also it can change the routes, where data is traveling.

That means the data is more secured and because the IP addresses and length of IP addresses are changing all the time the system can protect the data that is traveling inside the network. Also, the frequencies of the WLAN network can change all the time.

The chancing frequencies of the WLAN are quite easy to make. When the computer has access to the network, the WLAN router sends the mark after a certain time, that the frequency of the WLAN transmitting is chancing.

If the computer has the right encryption key in use, that makes the system able to find those changes in the transmitting frequencies. The fact is that in the same space can be two networks, that use the same name, but different frequencies. When the person would want to use the normal network, where regular data is traveling, that requires a normal log-in process. But when the person wants to use the secure network, the computer requires a special key, which might be the quantum prime number with billions of numbers.

That key might be in the USB stick, which has also the log-in routines to that secured network. The name of this ultra-secure network can be the same as the public network, which allows to deny the knowledge of the existence of that network. In that kind of network, the data might not be stored in the computer, which denies that in the case of losing the laptop the existence of data can be denied.

Modern technology allows using intelligent architecture in the network, and that makes the things like phishing and other hacking more difficult than ever before. Artificial intelligence can pick the messages, that are involving questions about passwords and other things, that might risk security.

The thing is that the system can also send messages, which should identify as phishing. The idea is that in the system orders are that the phishing messages are ordered to send the security branch. And if the reports of the phishing are not in the right mailbox, that thing tells that somebody is breaking the rules. And that kind of thing is the security risk.

https://newatlas.com/computers/morpheus-processor-secure-darpa-hackers/

Image:()https://newatlas.com/computers/morpheus-processor-secure-darpa-hackers/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Every object in orbit could be an ASAT weapon.

   Every object in orbit could be an ASAT weapon.  Researchers are worried. That China’s space-debris catcher can turn into an ASAT, an Anti...