ARTICLE
Atsign’s Co-founder and CTO, Colin Constable, Interviewed in SafetyDetectives about the atProtocol
Making the Internet Safer
Colin, our CTO and Co-founder, recently sat down with SafetyDetectives to discuss IoT security, online identity, and our patent-pending, open-source atProtocol.
In the interview, Colin recounts how the idea for Atsign sprouted out of his frustration with the current Internet, which allows companies to hoard peoples’ data. Colin answers questions like, How did he and co-founder, Kevin Nickels, come up with the innovative atProtocol? Why should companies be more focused on security and empowering customers to own their own data? How can an IoT device have no network attack surface, and no open ports? (Hint: SSH No Ports!)
Read how Atsign technology is ushering in the new era of the Internet. Special thanks to SafetyDetectives for covering this story.
SafetyDetectives are security-conscious researchers, product reviewers, and privacy experts concerned with informing the public on how to stay safe on the Internet.
How to Let AI Agents Act on Your Behalf Without Losing Control
Imagine your AI agent rebooking a canceled flight and hotel while you sleep—securely. Learn how the atPlatform solves the trust and permission problems of AI, allowing agents to act for you while you maintain total control.
Why 95% of GenAI Pilots Fail (and How to Ensure Yours Doesn’t)
Why do 95% of GenAI pilots fail? It’s not the AI—it’s the legacy infrastructure. Learn how to bridge the friction gap using Restricted Access Agents (RAA) to build a production-ready, secure future for your AI initiatives.
The AI Chain of Trust: Secured by Atsign
Your AI supply chain is a liability. Atsign secures it with verifiable identities and edge encryption to prevent model theft.
AI Sprawl: The Network Nightmare Caused by the AI Security Paradox
AI Sprawl is the resulting network complexity that occurs when enterprises must deploy many specialized AI agents to secure and govern the use of large language models (LLMs).
Why the Model Context Protocol (MCP) Demands a Structural Rethink of AI Security
AI agents using MCP bypass traditional network security, demanding an identity-first, Zero Trust architecture to eliminate the risks created by exposed ports and centralized tokens.