Here are some of the security constraints for the $100 laptop being designed by the One Laptop per Child (OLPC) project. The laptop must not be plagued by the viruses, worms, and Trojan horses that are common on Windows, yet the children who use the laptop must be able to download and run software at will. The computer must not allow students to fake e-mail and instant messages to one another, but students must not be required to use passwords. Shipments of laptops must not be a target of theft even though they are being sent to countries where official corruption is endemic and more than half of the economy is illegal.
Is this possible? I think so. For the past few months I’ve been collaborating with Ivan Krstić on a workable security model that incorporates some of the latest ideas and research findings from the HCI-SEC community. Krstić released the security model at the RSA Data Security Conference on Tuesday. Ryan Singel wrote a nice article about the model yesterday, and you can view the entire security document online.
One of the guiding principles of the security model is that programs running on the user’s computer should run with a restricted set of privileges–rather than with the privileges of the computer’s user. For example, there is no reason why your copy of Solitaire should be able to browse through your tax records and send interesting tidbits to organized criminals in Russia. Today’s generation of antivirus, antispyware programs work by having a list of all these bad programs and scanning for them. The OLPC approach is to simply deny your Solitare program from being able to access the network or browse your files. Why should it need those capabilities, anyway?
The so-called Bitfrost security model builds upon a lot of research ideas in virtual machines, declaratory installation bundles, and intentional computing. It gives users–many of whom will be children–the tools for the easy management of their own security.
I don’t know if it will work, but it’s the best thing going. And if Bitfrost does work, you can be sure that we’ll see these same ideas showing up in many desktop and handheld environments.
Capitalizing on machine learning with collaborative, structured enterprise tooling teams
Machine learning advances require an evolution of processes, tooling, and operations.
The Download: how to fight pandemics, and a top scientist turned-advisor
Plus: Humane's Ai Pin has been unveiled
The race to destroy PFAS, the forever chemicals
Scientists are showing these damaging compounds can be beat.
How scientists are being squeezed to take sides in the conflict between Israel and Palestine
Tensions over the war are flaring on social media—with real-life ramifications.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.