<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: harshalaardekar</title>
    <description>The latest articles on DEV Community by harshalaardekar (@harshalaardekar).</description>
    <link>https://dev.to/harshalaardekar</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F488947%2F8bee1455-4a52-41a4-8579-9a9a27d9f905.gif</url>
      <title>DEV Community: harshalaardekar</title>
      <link>https://dev.to/harshalaardekar</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/harshalaardekar"/>
    <language>en</language>
    <item>
      <title>Most Dangerous Town On The Internet</title>
      <dc:creator>harshalaardekar</dc:creator>
      <pubDate>Thu, 30 Sep 2021 18:01:45 +0000</pubDate>
      <link>https://dev.to/harshalaardekar/most-dangerous-town-on-the-internet-39f4</link>
      <guid>https://dev.to/harshalaardekar/most-dangerous-town-on-the-internet-39f4</guid>
      <description>&lt;p&gt;Norton has explored the secret world of bulletproof hosting that's hidden deep in underground bunkers, isolated at sea and spread across the web, They visited the world's first data heaven in North sea (former location of Heaven Co). The principality of sealon considers itself a sovereign country, is an abandoned world war II gun platform. At the dawn of the Internet, an idealist named Rnay Lackey founded the world's first data heaven online sovereign state by creating a bulletproof data hosting facility.&lt;br&gt;
The idea of Heaven Co was to have a place where people could host servers for Internet sites and the users would be located everywhere in the world and these servers will be located on Sealand in a physically secured environment and to have a very high quality of technical service and to be able to let the customers pick which laws applied to them.&lt;/p&gt;

&lt;p&gt;They found another bulletproof hoster "Cyber Bunker" a cold war nuclear bunker in the south of Holland and it's built to with stand a zo-megaton Holland blast. Cyber bunker was a notorious hoster for illegal material, especially Spain. It was also rumored to be home to numerous hoster. After a week of cryptic responses, the investigator of Norton decided to go inside the suspected location of Cyber Bunker in the Netherlands. They found face scanner at the doors, fresh coffee ground in the trash and an empty server rack that is recently being delivered. Afterwards, they managed to get in touch with a convicted black hat hacker who knew the owner of Cyber Bunker and they set up a meeting. In the meeting the investigator discovered that its name is no more Cyber Bunker and the new name has a code "MLOI". They also got to know that this was built to protect from the Russian Nuclear threat and in the cyber world its a gain providing the protection.&lt;/p&gt;

&lt;p&gt;They also got to know that they provide high end security for clients that trust them for their most valuable data and combine it with cybersecurity capabilities and that is not just a concrete or EMI shield that helps in terms of securing but also protecting the fibers and they cryptography from nowadays with all the trends like cloud and big data and IoT these are solely focused on cybersecurity and digital part of security the data. It has been also found that they have atleast two bunkers, in one country and so on, which gives advantage from the legislation perspective from data protection laws. It seemed Cyber Bunker had evolved from a place where scanner and hackers go to hide a place where government and cooperation go to save their data to protect from the military attacks. After Cyber Bunker, they visited "Bahnhof" which is embedded in a nuclear bunker 30m below the hills of Stockholm. This facility hosted the Wikileaks. After talking to the CEO of Bahnhof, they got to know that the fiber optic cables comes from many ways that is a secret.&lt;/p&gt;

&lt;p&gt;Then they met a former Data Analyst at Wikileaks - he told that the most famous server was Bahnhof which is an underground bunker and hyper-secure. When asked to CEO, besides there could be some illegal action down there but I don't open the boxes. I don't control what's on the boxes. The hosters would like to see themselves as the post office. But if they really want to be a post officer they have to act an abuse complaint when they come in.&lt;/p&gt;

&lt;p&gt;Bulletproof hoster is a hoster who will not take an action to take down your website.&lt;/p&gt;

&lt;p&gt;Nowadays the most effective form of bulletproof hosting isn't necessarily being a bunker, it's being in the cloud. The idea that you pretend like you're not doing anything illegal at all and you just sign up for regulator hosting like a regular customer and then the fask is to mask this fact that they take multiple hops before a victim is sent to the final destination and those hops are generally in different countries to make it difficult for the law of enforcement to get co-operation from all those countries in order to find out where the hosting is behind that cloud base is a start-up which protects against the denial of service (Dos). They claimed that they are shielding pro-ISIS sites from the hacking group's attack. It connects between your browser and your service from multiple locations around the world.&lt;/p&gt;

&lt;p&gt;It's the moral responsibility of hosters when it comes to what's out on the Internet we need to force companies to take the responsibility for our own. There is no absolute solution, essentially its constantly give and take.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>Diffie–Hellman key exchange</title>
      <dc:creator>harshalaardekar</dc:creator>
      <pubDate>Tue, 13 Oct 2020 18:21:46 +0000</pubDate>
      <link>https://dev.to/harshalaardekar/diffie-hellman-key-exchange-5ene</link>
      <guid>https://dev.to/harshalaardekar/diffie-hellman-key-exchange-5ene</guid>
      <description>&lt;p&gt;The Diffie-Hellman key exchange is the first widely used methodology for safely developing associated degreed exchanging keys over an insecure channel.It is used to secure a variety of Internet services.In the research published in October 2015 it is mentioned that the parameters used in many DH internet applications at that time were not strong enough to prevent compromise from attackers.It also includes security services of some countries.&lt;/p&gt;

&lt;p&gt;To make it understand more clearly, here is an  example which explains why the Diffie-Hellman key exchange is such an important milestone in the world of cryptography, and why it is still  frequently used today.&lt;/p&gt;

&lt;p&gt;The most common solution to encrypt the message is by using a code. Let us say that suppose you are a bad spy, and you and your  community decide to use a weak shift-cipher algorithm to encode the messages. Then in this code, every “a” will be encrypted as  “b”, every “b” will be encrypted as “c”, every “c” will be encrypted as “d”, and so on, until we reaches “z” encrypting as an “a”.&lt;/p&gt;

&lt;p&gt;Under this shift cipher, the message “Let us get dinner” becomes “Mfu vt hfu ejoofs”. Thankfully, in our theoretical scenario, your opponent is just as incompetent as you are and is unable to crack such a simple code, that prevent them from accessing the contents of the message.&lt;/p&gt;

&lt;p&gt;Cryptographic explanation:&lt;br&gt;
The simplest as well as original implementation of the protocol uses the multiplicative group of integers modulo p, where p stands for prime, and g is a primitive root modulo of p. These two values are chosen in such a way that it will ensure the resulting shared secret.We can select any value ranging from 1 to p–1. Let's see an example of the protocol, including non-secret values in blue, and secret values in red.&lt;/p&gt;

&lt;p&gt;Alice and Bob are publicly agreed to use a modulus p = 23 and base g = 5 (which is a primitive root modulo of 23).&lt;br&gt;
Suppose Alice chooses a secret integer a = 4, then he sends Bob A = ga mod p&lt;br&gt;
A = 54 mod 23 = 4&lt;br&gt;
Bob chooses a secret integer b = 3, and sends it to  Alice B = gb mod p&lt;br&gt;
B = 53 mod 23 = 10&lt;br&gt;
Alice computes s = Ba mod p&lt;br&gt;
s = 104 mod 23 = 18&lt;br&gt;
Bob computes s = Ab mod p&lt;br&gt;
s = 43 mod 23 = 18&lt;br&gt;
Alice and Bob now share a secret (the number 18).&lt;br&gt;
At this point,both Alice and Bob have arrived at the same values &lt;/p&gt;

&lt;p&gt;Only a and b are kept secret. All the other values – p, g, ga mod p, and gb mod p – are sent.The strength of the scheme comes from the fact that gab mod p = gba mod p take extremely long times to compute the knowledge of p, g, ga mod p, and gb mod p.After Alice and Bob compute the shared secret they can use it as an encryption key,which will known only to them, for sending messages across the same open communications channel.&lt;/p&gt;

&lt;p&gt;Of course, larger values of a, b, and p would be needed if we want to make this example secure, since there are only 23 possible results of n mod 23. However, if p is a prime of at least 600 digits, then even the fastest modern computers cannot find a given only g, p and ga mod p. Such a problem is called the discrete logarithm problem.[3] The computation of ga mod p is known as modular exponentiation and can be done efficiently even for large numbers. Note that g need not be large at all, and in practice is usually a small integer (like 2, 3, ...).&lt;/p&gt;

</description>
      <category>security</category>
    </item>
  </channel>
</rss>
