{"id":1466,"date":"2020-11-18T11:15:54","date_gmt":"2020-11-18T11:15:54","guid":{"rendered":"https:\/\/wpbeta.pointr.com\/?p=1466"},"modified":"2023-03-13T11:32:12","modified_gmt":"2023-03-13T09:32:12","slug":"protocol-defines-absolute-data-security-whether-you-never-see-it","status":"publish","type":"post","link":"https:\/\/de.pointr.com\/au\/2020\/11\/protocol-defines-absolute-data-security-whether-you-never-see-it\/","title":{"rendered":"Protocol defines absolute data security, whether you see it or not"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Post Content Section&#8221; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Back Button Section (DON\u2019T TOUCH)&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||true|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x23;||divi||400&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Back Button (DON\u2019T TOUCH)&#8221; module_class=&#8221;blog-back-button&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE2NyJ9fQ==@&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Back to blog<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; max_width=&#8221;960px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title author=&#8221;off&#8221; comments=&#8221;off&#8221; admin_label=&#8221;Post Title With Image (DONT CHANGE)&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_post_title][et_pb_text admin_label=&#8221;Text Content Section&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>Smooth real-time transmission of video stream is a standard requirement for remote collaboration solutions. Why fulfilling this feature is not sufficient, and why absolute data security is essential in all industrial usage, we will learn all this in this article.\u00a0<\/strong><\/p>\n<p><strong><em>Update October 2022: Delta Cygni Labs released XRTC API and SDK as a new product line, learn more at <a href=\"https:\/\/xrtc.org\" target=\"_blank\" rel=\"noopener\">XRTC.org<\/a><\/em><\/strong><\/p>\n<p>Pandemic! Shut-down! Travel restrictions! Real time collaboration across borders and continents\u00a0 has become increasingly important in recent years. Now even the most agile teams are facing difficulties in their cooperation. Companies are presented with great technical and organisational challenges. The solution to these challenges is Remote Collaboration.<\/p>\n<p>Video conferences and meetings have become an integral part of business life, as have remote maintenance solutions. If your company is using one of the consumer grade solutions, every time someone in the company network makes a video call with a customer, an employee or a third-party technician, you have to punch a hole inthe company\u2019s firewall. That has to be for every such collaboration, because the solutions are dependant on the WebRTC protocol which is built on the User Datagram Protocol (UDP). These protocols can never provide absolute data security, because\u00a0 the more contacts you have, the more holes you have to punch:<\/p>\n<ul>\n<li>If you manage a national or international remote dealer network<\/li>\n<li>When you instruct external technicians via remote guidance<\/li>\n<li>If you work across several locations<\/li>\n<li>When your production or your products are IoT ready<\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2397\" src=\"https:\/\/pointr.com\/wp-content\/uploads\/2020\/11\/UDP_PROTOCOL-01-768x326-1.png\" alt=\"\" width=\"460\" height=\"195\" \/><br \/><figcaption><em>With UDP, a hole must be punched to the firewall when communicating with someone outside the network<\/em><\/figcaption><\/figure>\n<\/div>\n<p>This unavoidable vulnerability of many video collaboration solutions is a result of the protocol used. Therefore the employees working from home offices not only often provide amusing insights into their private lives through insufficiently secured video conferences, but they also give skilled hackers the opportunity to gain deep insights into the company systems and data. In the worst case, attackers can completely take over your system or the Machinery and equipment you supply.<\/p>\n<p><strong>What does protocol mean?<\/strong><\/p>\n<p>Protocol is the term used to describe the standards and norms that define the way in which data is transferred between different computer components, computer systems and networks on the Internet. Whenever you join a video conference or use a remote maintenance solution, the systems involved have negotiated this protocol beforehand.<\/p>\n<p>What many do not know: The User Datagram Protocol (UDP) used by the vast majority of softwares was developed as early as 1980 and was later used mainly in online gaming. Accordingly, it had to guarantee above all a smooth data transfer. It never had to be particularly secure.<\/p>\n<p>Correct: If you use video conferences, web-meetings or remote guidance solutions, your company\u2019s cyber security depends on a protocol that exists to serve online gaming. A protocol that was adopted by SKYPE some 20 years ago because there was no other protocol to use for real-time communication.<\/p>\n<p>This protocol has major security gaps due to its architecture. The latest attack method is so-called NAT Slipstreaming, which uses the inbound connections essential to UDP based communication as a point of attack. For each inbound connection a \u201chole\u201d must be opened in the firewall must. Therefore, more contacts your system has outside your network, the more entry points your firewall has to allow.<\/p>\n<p>These holes in the firewall can be monitored, but it takes enormous resources to constantly close the holes caused by UDP based communication. You need some good admins to react on every new challenge. You need state-of-the-art hardware. You or your IT staff need time. A lot of time. And even if you can guarantee these resources NOW for your company \u2013 can you also guarantee them for those collaborators sitting in front of their screen somewhere in the world?<\/p>\n<p>Most companies can only answer \u201cno\u201d to this question. As well as the question of how the additional expenses can be managed in the future with the increasing use of remote collaboration solutions \u2013 also in regard to new technologies likeIoT, smart factories and smart home.<\/p>\n<p><strong>The alternative for absolute data security: XRTC<\/strong><\/p>\n<p>There is a protocol that guarantees smooth data transmission and is secure. As the only remote collaboration solution on the market, POINTR uses the XRTC protocol. The XRTC protocol was developed by Delta Cygni Labs from the older Transmission Control Protocol (TCP). Not only its architecture protects against the current NAT slipstreaming attacks pestering UDP based solutions, but because it does not use any inbound connections, it is also protected against all methods that could use this vulnerability in the future.<\/p>\n<p><a href=\"mailto:sales@deltacygnilabs.com?subject=I%20want%20to%20learn%20more%20about%20POINTR%20XRTC!\"><strong>Contact us to find out more!<\/strong><\/a><\/p>\n<p>XRTC was originally developed to ensure communication between European Space Agency sites in different European countries. From the very beginning, the solution had to meet the absolute data security requirements: same level as governmental and military projects. The development therefore followed the Security by Design (SBD) approach. This means that the software was designed from the ground up to ensure that there are no points of attack.<\/p>\n<p><strong>The secure-by-design principle as foundation of XRTC<\/strong><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2396 alignnone size-full\" src=\"https:\/\/pointr.com\/wp-content\/uploads\/2020\/11\/UDP_opendoor-01-300x193-1.png\" alt=\"\" width=\"300\" height=\"193\" srcset=\"https:\/\/de.pointr.com\/wp-content\/uploads\/2020\/11\/UDP_opendoor-01-300x193-1.png 300w, https:\/\/de.pointr.com\/wp-content\/uploads\/2020\/11\/UDP_opendoor-01-300x193-1-16x10.png 16w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/><figcaption><em>With UDP data packets are delivered straight \u201chome\u201d like through an open door<\/em><\/figcaption><\/figure>\n<\/div>\n<p>XRTC uses strictly outgoing TLS1.2 connections and thus follows the concept of Poste Restante. In regard to real time digital communication this means that all data packets are stored outside the own network.<\/p>\n<p>In contrast to UDP, the data packets are not delivered \u201chome\u201d, straight to the own address, but the XRTC periodically picks up the data packets from a \u201cPO box\u201d located outside the firewall. In this way XRTC does not allow any external supplier to enter through the firewall, but also does not disclose its address to any\u00a0 one it is communicating with.<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2395 size-full\" src=\"https:\/\/pointr.com\/wp-content\/uploads\/2020\/11\/UDP_opendoor-02.png\" alt=\"\" width=\"785\" height=\"314\" srcset=\"https:\/\/pointr.com\/wp-content\/uploads\/2020\/11\/UDP_opendoor-02.png 785w, https:\/\/pointr.com\/wp-content\/uploads\/2020\/11\/UDP_opendoor-02-480x192.png 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 785px, 100vw\" \/><br \/><figcaption><em>The XRTC protocol works like Poste Restante and malicious packets never get \u201chome\u201d<\/em><\/figcaption><\/figure>\n<p>The XRTC also solves a TCP problem known among experts as \u201cHead of Line Blocking\u201d. This HoL Blocking is known to the common user as \u201clagging\u201d \u2013 delayed transmission or still images during video conferences and video transmissions.<\/p>\n<p>XTRC and solutions based on it work in all wireless networks (WiFi, 3G, 4G and 5G). In particular, XRTC technology has significant advantages in the 5G network and edge computing. The protocol is not only secure today, but is also built to withstand future threats.<\/p>\n<p><strong>The most secure remote collaboration solution on the market<\/strong><\/p>\n<p>1. POINTR is the only remote collaboration solution on the market with absolute data security. It is not only 100% protected against NAT slipstreaming attacks, but also completely eliminates attack vectors that rely on that vulnerability: inbound ports that are opened for UDP based protocols.<\/p>\n<p>2. Exchanging content over digital communication solutions is a common and easy attack point for hackers with malicious intents .You can exchange content and avoid security threats with your business partners using the secure way of content sharing: only exchanging the content without sending any files. Just showing content over the communication tool eliminates all threats of sending and downloading files.<\/p>\n<p>3. All handshakes and contacts take place outside your secure network. Potentially infected files stay outside, because ALL files stay outside. All this without admin effort and without the need and expense to constantly update to the latest hardware.<\/p>\n<p>The XRTC protocol used by POINTR \u2013 even if you are not yet familiar with it \u2013 is already used worldwide in production by well-known <a href=\"https:\/\/pointr.com\/use-cases\/\">customers<\/a> and has proven itself in commercial operation as well as in demanding security audits and penetration tests.<\/p>\n<p>Learn more about <a href=\"https:\/\/pointr.com\">POINTR<\/a> and the <a href=\"https:\/\/xrtc.org\">XTRC protocol<\/a>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_post_nav admin_label=&#8221;Post Navigation (DONT TOUCH)&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_post_nav][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>Smooth real-time transmission of video stream is a standard requirement for remote collaboration solutions.<\/p>","protected":false},"author":1,"featured_media":1471,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-1466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/posts\/1466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/comments?post=1466"}],"version-history":[{"count":10,"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/posts\/1466\/revisions"}],"predecessor-version":[{"id":2751,"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/posts\/1466\/revisions\/2751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/media\/1471"}],"wp:attachment":[{"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/media?parent=1466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/categories?post=1466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.pointr.com\/au\/wp-json\/wp\/v2\/tags?post=1466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}