ARTICLE
Atsign’s Co-founder and CTO, Colin Constable, Interviewed in SafetyDetectives about the atProtocol
Making the Internet Safer
Colin, our CTO and Co-founder, recently sat down with SafetyDetectives to discuss IoT security, online identity, and our patent-pending, open-source atProtocol.
In the interview, Colin recounts how the idea for Atsign sprouted out of his frustration with the current Internet, which allows companies to hoard peoples’ data. Colin answers questions like, How did he and co-founder, Kevin Nickels, come up with the innovative atProtocol? Why should companies be more focused on security and empowering customers to own their own data? How can an IoT device have no network attack surface, and no open ports? (Hint: SSH No Ports!)

Read how Atsign technology is ushering in the new era of the Internet. Special thanks to SafetyDetectives for covering this story.
SafetyDetectives are security-conscious researchers, product reviewers, and privacy experts concerned with informing the public on how to stay safe on the Internet.
Your Digital Doors Are Wide Open: An Urgent Warning
The FBI warns open network ports are critical security flaws. Learn why eliminating these “digital doors” is vital to protect your organization from cybercriminals and secure your future.
Understanding Picosegmentation for Network Security
Picosegmentation protects individual elements, simplifies management, and defends against lateral movement. It is a secure and easy to maintain alternative to microsegmentation.
Quick, Easy, & Secure GPU Arbitrage with Atsign’s atPlatform
Learn how atPlatform enables secure GPU arbitrage while cutting costs, minimizing downtime, and simplifying workload migration.
New Legislation Poised to Give People More Control Over Their Data
Utah has passed the Digital Choice Act, landmark legislation that could reshape how social media applications handle people’s data.
Shifting the Paradigm: Atsign’s Organic Security Approach
Atsign’s built-in security—encryption, zero trust architecture, and a least privilege approach—performs better than firewalls and authentication systems.