ARTICLE
SSH No Ports Provides Complete Device Lockdown
IoT Trust: The Future of IoT Privacy & Security
Last year, along with our partners, ZARIOT and Kigen, we announced IoT Trust, a simple, yet effective solution for IoT privacy and security. It is imperative that IoT device manufacturers, systems integrators, and solution owners use Networking 2.0 technology that solves today’s problems while looking towards the future. Our vision of the future is one where devices connected to the Internet are virtually hackproof, and able to be completely locked down (remotely!) if they are stolen or compromised.

We have since developed an eminently useful tool called SSH No Ports, which allows people to SSH to a remote device without having any ports open. Yes, you read that correctly!
With an eye towards the future, we see how SSH No Ports will continue to define an era of privacy and security. We see a future where our connected devices are virtually unhackable. There are three basic components to these unhackable devices:
1) No Network Attack Surface
- SSH No Ports uses outbound-only connections, leaving your device secure on the network, with no network attack surface.
2) Key Storage
- Along with our partner, ZARIOT, we are engineering a method for storing a device’s private key on a SIM card (or other secure element).
3) Deletion Control
- Forthcoming enhancements to the core atProtocol will enable an atSign owner to revoke the ability of a device to authenticate to their atSign.
- SSH No Ports can then be enhanced so that if it detects that access has been revoked, it deletes any sensitive data being held on the device.
SSH No Ports will allow people to remotely access their devices in the event that they are stolen or otherwise compromised. This is similar to how Apple allows people to use their Apple IDs to lock down their devices, except instead of a company routing your data, you are the one in control.
Contact us at info@atsign.com to learn more, and see how SSH No Ports can help you with your work and projects.
Photo Credit: pondsaksitphotos
Networking 2.0 vs. APIs
Networking 2.0 technology is better than current APIs because it keeps your data private. With current APIs, anyone can see your data when it is being sent between applications. Networking 2.0 technology encrypts your data so that only the intended recipient can see it.
Secure RDP Using SSH No Ports
Secure RDP using SSH No ports and Networking 2.0 technology. Quickly access your remote desktop without any open listening ports.
Secure Your Radio Station with Networking 2.0
KRYZ Radio Station in Mariposa, CA recently turned to Atsign’s Networking 2.0 technology to secure their broadcast.
Top 4 Difficulties of Managing Gateways at Scale and How Networking 2.0 Can Make them Disappear
With the expansion of IoT devices connected to the Internet, it is difficult to manage gateways at scale. Networking 2.0 technology relieves these difficulties, and eliminates network attack surfaces.
Close Port 22 Forever
Close Port 22 forever with SSH No Ports. Try out Networking 2.0 for yourself with hassle-free remote access to your devices from anywhere, all without having to know fixed IP addresses, and with no listening ports open.