{"id":2047,"date":"2019-05-04T22:58:08","date_gmt":"2019-05-04T22:58:08","guid":{"rendered":"http:\/\/www.buysatellite.net\/blog\/?p=2047"},"modified":"2019-05-10T18:49:02","modified_gmt":"2019-05-10T18:49:02","slug":"can-we-stop-hacks-before-they-start","status":"publish","type":"post","link":"https:\/\/www.buysatellite.net\/blog\/can-we-stop-hacks-before-they-start\/","title":{"rendered":"Can We Stop Computer Hacks Before They Start?"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\" style=\"text-align:center\"><strong>Can&nbsp;We&nbsp;Stop&nbsp;Hacks&nbsp;Before They&nbsp;Start?<\/strong><\/h1>\n\n\n\n<p>As you know, vulnerability to hacks has proven the great weakness of computer architecture, and the persistent vexation of I T professionals. But what can you do about it? What can anyone do about it? Security professionals keep refining their encryption standards, and hackers quickly figure out new ways to break the encryption.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg\" alt=\"Image result for hacker images\" width=\"908\" height=\"551\"\/><\/figure><\/div>\n\n\n\n<p>Writing ever more sophisticated security algorithms is only a stop-gap measure, since many hackers now command such massive processing power, they can easily break the most complex codes.<\/p>\n\n\n\n<p>Do we just have to accept our susceptibility to debilitating hacks, then? So it would seem.<\/p>\n\n\n\n<p>Some computer security experts, though, aren&#8217;t ready to give up. A professor at the <a href=\"https:\/\/umich.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"University of Michigan (opens in a new tab)\">University of Michigan<\/a>, in fact, claims to have developed a foolproof barrier to hackers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-align:center\"><strong>MORPHEUS Weighs In<\/strong><\/h3>\n\n\n\n<p>The professor, Dr. Todd Austin, says his team has produced a processor chip, called MORPHEUS, that hackers can&#8217;t defeat. The chip&#8217;s great advantage is speed. It encrypts and randomly rearranges its own code twenty times per second. This is thousands of times as fast as the most blisteringly brisk electronic hacking methods, and incomparably faster than any human hacker.<\/p>\n\n\n\n<p>&#8220;Today&#8217;s approach of eliminating security bugs one by one is a losing proposition&#8221;, Austin says, &#8220;People are constantly writing code, and as long as there is new code, there will be new bugs and security vulnerabilities.&#8221;<\/p>\n\n\n\n<p>&#8220;With MORPHEUS&#8221;, Austin said, &#8220;even if a hacker finds a bug, the information needed to exploit it vanishes fifty milliseconds later. It&#8217;s perhaps the closest thing to a future-proof secure system.&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-align:center\">Testing the New Chip<\/h3>\n\n\n\n<p>Of course, this sounds impressive in theory, but how does MORPHEUS work in practice? To answer this question, Austin&#8217;s team tested a DARPA-funded prototype. It thwarted every known form of control-flow attack, one of the most dangerous of all hacks, and one of the most commonly used.<\/p>\n\n\n\n<p>The churn rate can be speeded or slowed depending on customer needs. Some customers will want to prioritize security; others will emphasize energy savings and speed of operation. Austin says he tested the chip at fifty milliseconds because it outstrips the speed of the fastest electronic hacks by thousands of times, but slows performance by only one percent.<\/p>\n\n\n\n<p>The chip also incorporates an attack sensor. It maintains watch against potential hacks, and accelerates the churn rate if detects an impending attack.<\/p>\n\n\n\n<p>Austin and his team plan to market MORPHEUS as a commercial product.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-align:center\"><strong>Where do we go from here?<\/strong><\/h3>\n\n\n\n<p>If the MORPHEUS chip is all that Todd Austin says it is, then most of our worries about computer security will soon be a thing of the past. Hackers can never keep pace with ever-changing code arrangement, and so all hacking attempts will be futile.<\/p>\n\n\n\n<p>Of course, this doesn&#8217;t mean we can afford negligence with passwords, nor that we can safely open attachments sent by unfamiliar parties. Still, with reasonable caution about computer use, we can be certain our data is secure.<\/p>\n\n\n\n<p>If MORPHEUS performs as advertised, we need never fear hackers again.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"text-align:center\"><strong><em>For the best deal on the best internet connection, shop with Satellite Country. We can help.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can&nbsp;We&nbsp;Stop&nbsp;Hacks&nbsp;Before They&nbsp;Start? As you know, vulnerability to hacks has proven the great weakness of computer architecture, and the persistent vexation of I T professionals. But what can you do about it? What can anyone do about it? Security professionals keep refining their encryption standards, and hackers quickly figure out new ways to break the encryption. &hellip; <a href=\"https:\/\/www.buysatellite.net\/blog\/can-we-stop-hacks-before-they-start\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Can We Stop Computer Hacks Before They Start?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2047","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Can we stop computer hacks before they start?<\/title>\n<meta name=\"description\" content=\"Vulnerability to hacks has been the great weakness of computer architecture, and the greatest vexation of IT professionals.. How can we defeat the hackers?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can we stop computer hacks before they start?\" \/>\n<meta property=\"og:description\" content=\"Vulnerability to hacks has been the great weakness of computer architecture, and the greatest vexation of IT professionals.. How can we defeat the hackers?\" \/>\n<meta property=\"og:url\" content=\"http:\/\/Can You Stop Hacks Before They Start?\" \/>\n<meta property=\"og:site_name\" content=\"Hughesnet Satellite Internet News\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-04T22:58:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-10T18:49:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg\" \/>\n<meta name=\"author\" content=\"Phillip Atteberry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Phillip Atteberry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.buysatellite.net\/blog\/can-we-stop-hacks-before-they-start\/\",\"url\":\"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?\",\"name\":\"Can we stop computer hacks before they start?\",\"isPartOf\":{\"@id\":\"http:\/\/www.buysatellite.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#primaryimage\"},\"image\":{\"@id\":\"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg\",\"datePublished\":\"2019-05-04T22:58:08+00:00\",\"dateModified\":\"2019-05-10T18:49:02+00:00\",\"author\":{\"@id\":\"http:\/\/www.buysatellite.net\/blog\/#\/schema\/person\/5323c12cd0cad6b7aae45939aa2974a6\"},\"description\":\"Vulnerability to hacks has been the great weakness of computer architecture, and the greatest vexation of IT professionals.. How can we defeat the hackers?\",\"breadcrumb\":{\"@id\":\"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#primaryimage\",\"url\":\"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg\",\"contentUrl\":\"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/www.buysatellite.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Can We Stop Computer Hacks Before They Start?\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.buysatellite.net\/blog\/#website\",\"url\":\"http:\/\/www.buysatellite.net\/blog\/\",\"name\":\"Hughesnet Satellite Internet News\",\"description\":\"retailing internet services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.buysatellite.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.buysatellite.net\/blog\/#\/schema\/person\/5323c12cd0cad6b7aae45939aa2974a6\",\"name\":\"Phillip Atteberry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.buysatellite.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6824da51d4ac3f7648f1354ad2315741?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6824da51d4ac3f7648f1354ad2315741?s=96&d=mm&r=g\",\"caption\":\"Phillip Atteberry\"},\"sameAs\":[\"http:\/\/www.buysatellite.net\"],\"url\":\"https:\/\/www.buysatellite.net\/blog\/author\/phillip\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can we stop computer hacks before they start?","description":"Vulnerability to hacks has been the great weakness of computer architecture, and the greatest vexation of IT professionals.. How can we defeat the hackers?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/Can You Stop Hacks Before They Start?","og_locale":"en_US","og_type":"article","og_title":"Can we stop computer hacks before they start?","og_description":"Vulnerability to hacks has been the great weakness of computer architecture, and the greatest vexation of IT professionals.. How can we defeat the hackers?","og_url":"http:\/\/Can You Stop Hacks Before They Start?","og_site_name":"Hughesnet Satellite Internet News","article_published_time":"2019-05-04T22:58:08+00:00","article_modified_time":"2019-05-10T18:49:02+00:00","og_image":[{"url":"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg","type":"","width":"","height":""}],"author":"Phillip Atteberry","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Phillip Atteberry","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.buysatellite.net\/blog\/can-we-stop-hacks-before-they-start\/","url":"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?","name":"Can we stop computer hacks before they start?","isPartOf":{"@id":"http:\/\/www.buysatellite.net\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#primaryimage"},"image":{"@id":"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#primaryimage"},"thumbnailUrl":"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg","datePublished":"2019-05-04T22:58:08+00:00","dateModified":"2019-05-10T18:49:02+00:00","author":{"@id":"http:\/\/www.buysatellite.net\/blog\/#\/schema\/person\/5323c12cd0cad6b7aae45939aa2974a6"},"description":"Vulnerability to hacks has been the great weakness of computer architecture, and the greatest vexation of IT professionals.. How can we defeat the hackers?","breadcrumb":{"@id":"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#primaryimage","url":"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg","contentUrl":"https:\/\/www.lifewire.com\/thmb\/DLiIvQLx9Z-YuqEa5jZo8augGyI=\/768x0\/filters:no_upscale():max_bytes(150000):strip_icc()\/hacker-with-laptop-922359280-5c32d4a546e0fb00011bb991.jpg"},{"@type":"BreadcrumbList","@id":"http:\/\/Can%20You%20Stop%20Hacks%20Before%20They%20Start?#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.buysatellite.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Can We Stop Computer Hacks Before They Start?"}]},{"@type":"WebSite","@id":"http:\/\/www.buysatellite.net\/blog\/#website","url":"http:\/\/www.buysatellite.net\/blog\/","name":"Hughesnet Satellite Internet News","description":"retailing internet services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.buysatellite.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/www.buysatellite.net\/blog\/#\/schema\/person\/5323c12cd0cad6b7aae45939aa2974a6","name":"Phillip Atteberry","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.buysatellite.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6824da51d4ac3f7648f1354ad2315741?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6824da51d4ac3f7648f1354ad2315741?s=96&d=mm&r=g","caption":"Phillip Atteberry"},"sameAs":["http:\/\/www.buysatellite.net"],"url":"https:\/\/www.buysatellite.net\/blog\/author\/phillip\/"}]}},"_links":{"self":[{"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/posts\/2047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/comments?post=2047"}],"version-history":[{"count":9,"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/posts\/2047\/revisions"}],"predecessor-version":[{"id":2093,"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/posts\/2047\/revisions\/2093"}],"wp:attachment":[{"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/media?parent=2047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/categories?post=2047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.buysatellite.net\/blog\/wp-json\/wp\/v2\/tags?post=2047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}