The Internet is a wondrous place. The most convenient and massive source of information. You have the luxury of accessing any web-site with a simple mouse click. Particularly useful for students. It allows everyone to find and compile all the relevant information quickly; explore popular tourist destinations; find recipes for tasty meals or maybe even get some professional help from Australian assignment writers.
“Between the mind that plans and the hands that build there must be a Mediator, and this must be the heart.” This famous line from Germany’s 1927 masterpiece, Metropolis, continues to resonate today.
Anybody who uses the Internet uses, creates and leaves data behind. While in the past site visits were recorded in the depths of server log files rarely to surface again, these and related data are now the currency of the 21st century. Services are exchanged for data, this is the business model shared by Google, Amazon and many others. But people are becoming more aware that the uninhibited acquisition of their personal data may have negative consequences and no longer trust that their data is protected on the Internet.
Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits from energy efficiencies and greener lifestyles to cost savings and improved living standards for all. Early examples of IP-connected appliances, however, were not built to cope with the demands of an evolving threat landscape.
Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users are not completely invisible. Firstly, only the connection to the exit node – the last server before traffic leaves the Tor network – is encrypted. Whoever controls the exit node can see data traffic in plain text. Meanwhile attacks and statistical analysis methods are known which can allow an organization with access to large parts of global Internet traffic to de-anonymize users in some cases. Nevertheless, Tor can protect users against the curiosity of most unauthorized parties if it is configured correctly. And a better solution is currently not available – at least not for the average computer user.