ARTICLE
Atsign’s Co-founder and CTO, Colin Constable, Interviewed in SafetyDetectives about the atPlatform Protocol
Making the Internet Safer
Colin, our CTO and Co-founder, recently sat down with SafetyDetectives to discuss IoT security, online identity, and our patent-pending, open-source atPlatform Protocol.
In the interview, Colin recounts how the idea for Atsign sprouted out of his frustration with the current Internet, which allows companies to hoard peoples’ data. Colin answers questions like, How did he and co-founder, Kevin Nickels, come up with the innovative atPlatform Protocol? Why should companies be more focused on security and empowering customers to own their own data? How can an IoT device have no network attack surface, and no open ports? (Hint: SSH No Ports!)
Read how Atsign technology is ushering in the new era of the Internet. Special thanks to SafetyDetectives for covering this story.
SafetyDetectives are security-conscious researchers, product reviewers, and privacy experts concerned with informing the public on how to stay safe on the Internet.
SSH No Ports Passes Pen Test
Atsign is proud to share that SSH No Ports has passed a rigorous pen test.
Networking 2.0 vs. APIs
Networking 2.0 technology is better than current APIs because it keeps your data private. With current APIs, anyone can see your data when it is being sent between applications. Networking 2.0 technology encrypts your data so that only the intended recipient can see it.
Secure RDP Using SSH No Ports
Secure RDP using SSH No ports and Networking 2.0 technology. Quickly access your remote desktop without any open listening ports.
Secure Your Radio Station with Networking 2.0
KRYZ Radio Station in Mariposa, CA recently turned to Atsign’s Networking 2.0 technology to secure their broadcast.
Top 4 Difficulties of Managing Gateways at Scale and How Networking 2.0 Can Make them Disappear
With the expansion of IoT devices connected to the Internet, it is difficult to manage gateways at scale. Networking 2.0 technology relieves these difficulties, and eliminates network attack surfaces.