Despite upgrades, security experts fear $100 laptops
Debate remains over how to protect devices intended for poor children
InfoWorld - WASHINGTON - Despite a concerted effort on the part of the One Laptop per Child project to improve the overall security of its devices, researchers contend that the effort to distribute new teaching resources to the world's young and poor could create significant problems.
Addressing the assembled crowd during the final presentation of this year's ShmooCon show yesterday, a panel of experts ranging from the laptop program's chief security architect to well-known white hat industry pundits debated the potential impact of the project, which hopes to distribute as many as 10 million of its sub-$100 devices in the next year.
Since the OLPC project's inception in 2005, security experts have openly questioned how the group would ensure that its diminutive, neon-colored laptops wouldn't be used to wreak havoc, or be overrun by malware attacks, after they land in children's hands.
Many of the recipients will be in developing regions of the world where the devices may be stolen from youngsters and where end users will have little concept of the dangers that exist in the computing world, critics said.
Ivan Krstic', director of security architecture for OLPC, which has its base of operations in Cambridge, Mass., said the project's newly upgraded laptop prototype has added many innovations that will help keep the computers operating safely.
OLPC has long maintained that strong ties between the program and the United Nations, along with the devices' colorful appearance, will protect them from being swiped from the children, aged 5 to 15, who carry them in hazardous social environments.
When the latest model of the device -- dubbed the XO-1 and made by Quanta -- was introduced in February, it carried a new security architecture along with its hardware upgrades that will make the machines in some ways more secure than some traditional desktop PCs, Krstic' said.
Labeled as Bitfrost, the security architecture includes embedded technology, to allow more powerful encryption, and so-called "theft leases," which allow the laptops to be shut down remotely if stolen. To eliminate many of the virus attacks that plague common desktops, the Linux-based operating system of the XO-1 cannot be altered.
But perhaps the most important security feature built into the devices is also one of its most controversial, Krstic' admitted.
Traditional security philosophy would likely dictate placing strict controls over what applications could be run on the machines, but the OLPC believes that its design can block attacks and foster learning through an approach that's more open yet promises unique protection.
Users can download whatever programs they like on the laptops, but the computers won't accept unapproved applications that execute virus-like behavior. The system also seeks to prevent attacks that violate any of the device's underlying protections, such as banning any Web-based software that attempts to view footage on the machines' onboard cameras.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts