Categories: Security

Google Uses Cryptographic Signatures, Prevents NSA Backdoor

Google, the technology company overseen by the US$561 billion parent corporation Alphabet, recently released a document entitled “Google Infrastructure Security Design Overview” to provide an overview of how security measures are implemented into Google’s global scale infrastructure.

Within this infrastructure, Google operates some of its highly demanded and widely used applications such as Google Search, Gmail, Drive and Photos that are utilized by billions of people on a monthly basis.

Using Cryptographic Signatures

According to the document, Google server machines rely on cryptographic signatures which are validated upon boot or update. The implementation of cryptographic signatures as well as Google’s custom-built hardware security chip allow Google administrators to identify and authenticate legitimate Google devices.

Essentially, Google embeds custom-designed trusted platform modules (TPMs) in their hardware infrastructure, which allows the firm to protect the infrastructure with cryptographic keys and encryption system. Because TPMs operate as microcontrollers with integrated cryptographic keys, Google infrastructure prevents data or hardware manipulation and tampering.

“We use cryptographic signatures over low-level components like the BIOS, bootloader, kernel, and base operating system image. These signatures can be validated during each boot or update. The components are all Google-controlled, built, and hardened,” read the document.

Google also offers multiple layers of protection for data storage with the utilization of hardware encryption on hard drives and SSDs, making it virtually impossible for malware or data breaches to target Google-encrypted data. In addition, Google also ensures that an encrypted storage device is cleaned using a “multi-step process,” when it leaves its custody.

“Performing encryption at the application layer allows the infrastructure to isolate itself from potential threats at the lower levels of storage such as malicious disk firmware. That said, the infrastructure also implements additional layers of protection. We enable hardware encryption support in our hard drives and SSDs and meticulously track each drive through its lifecycle,” said Google.

Related Post

Encryption Makes it Impossible for Security Agencies to use Backdoor Tech

The combination of hardware encryption and the utilization of TPMs to cryptographically secure data effectively disallows surveillance of users and theft of valuable information. In other words, with Google’s encryption and cryptographic systems in place, security agencies like NSA will not be able to use backdoor tools or other sophisticated technologies to obtain data from the Google infrastructure.

In a section entitled “Encryption of Inter-Service Communication,” Google further emphasized that communication within Google’s infrastructure will remain secure even if the network is “tapped” or a network device is compromised. Thus, even if agencies attempt to use surveillance methods to obtain calls or messages, their efforts will be disregarded.

“In essence, this gives application layer isolation and removes any dependency on the security of the network path. Encrypted inter-service communication can remain secure even if the network is tapped or a network device is compromised,” the document read.

As technology conglomerates like Google move towards cryptography and encryption-based systems, users will develop awareness on privacy protection, pressuring other tech firms or data-based companies to implement necessary security measures.

Image Via: DT

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

Joseph Young

Joseph Young is a finance and tech journalist based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering exclusive content, interviews, insights and analysis of cryptocurrencies, innovative and futuristic technologies.

Share
Published by
Joseph Young

Recent Posts

Justin Sun Pledges $SUN Buybacks With SunPerp Revenue

Justin Sun, CEO of TRON DAO, has just made one of his biggest announcements of…

2 days ago

$BNB Hits $1,000 ATH as Market Cap Reaches $145.7B

$BNB has broken through a historic milestone. The token surged past $1,000, setting a new…

3 days ago

Top 5 DeFi Tokens Less Than $1 Price Mark To Watch In September

Decentralized finance (DeFi) has continued to disrupt traditional financial systems, offering permissionless access to lending,…

3 days ago

Solana Data Insights: App Revenues Hit $193.5M in August, Up 126% YoY

Solana’s app economy posted another breakout month. Total application revenues surged to $193.5 million in…

4 days ago

Sharps Technology Aligns with Bonk for Treasury Staking and Solana Growth

Sharps Technology (NASDAQ: STSS) is making a major move in the Solana ecosystem. The company,…

4 days ago

Understand AR In the Context of LivLive’s Game Layer for Reality Ecosystem

LivLive is redefining augmented reality (AR) gaming by turning real-world actions into measurable value for…

4 days ago