Despite upgrades, security experts fear $100 laptops
Debate remains over how to protect devices intended for poor children
InfoWorld - WASHINGTON - Despite a concerted effort on the part of the One Laptop per Child project to improve the overall security of its devices, researchers contend that the effort to distribute new teaching resources to the world's young and poor could create significant problems.
Addressing the assembled crowd during the final presentation of this year's ShmooCon show yesterday, a panel of experts ranging from the laptop program's chief security architect to well-known white hat industry pundits debated the potential impact of the project, which hopes to distribute as many as 10 million of its sub-$100 devices in the next year.
Since the OLPC project's inception in 2005, security experts have openly questioned how the group would ensure that its diminutive, neon-colored laptops wouldn't be used to wreak havoc, or be overrun by malware attacks, after they land in children's hands.
Many of the recipients will be in developing regions of the world where the devices may be stolen from youngsters and where end users will have little concept of the dangers that exist in the computing world, critics said.
Ivan Krstic', director of security architecture for OLPC, which has its base of operations in Cambridge, Mass., said the project's newly upgraded laptop prototype has added many innovations that will help keep the computers operating safely.
OLPC has long maintained that strong ties between the program and the United Nations, along with the devices' colorful appearance, will protect them from being swiped from the children, aged 5 to 15, who carry them in hazardous social environments.
When the latest model of the device -- dubbed the XO-1 and made by Quanta -- was introduced in February, it carried a new security architecture along with its hardware upgrades that will make the machines in some ways more secure than some traditional desktop PCs, Krstic' said.
Labeled as Bitfrost, the security architecture includes embedded technology, to allow more powerful encryption, and so-called "theft leases," which allow the laptops to be shut down remotely if stolen. To eliminate many of the virus attacks that plague common desktops, the Linux-based operating system of the XO-1 cannot be altered.
But perhaps the most important security feature built into the devices is also one of its most controversial, Krstic' admitted.
Traditional security philosophy would likely dictate placing strict controls over what applications could be run on the machines, but the OLPC believes that its design can block attacks and foster learning through an approach that's more open yet promises unique protection.
Users can download whatever programs they like on the laptops, but the computers won't accept unapproved applications that execute virus-like behavior. The system also seeks to prevent attacks that violate any of the device's underlying protections, such as banning any Web-based software that attempts to view footage on the machines' onboard cameras.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts