1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Unisys unveils invisibility cloak for network traffic

Discussion in 'Network World' started by RSS, Mar 24, 2015.

  1. RSS

    RSS New Member Member

    If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

    Stealth has been around since 2005 when it was developed exclusively for the Defense Department. Several years ago Unisys took it to commercial enterprises and has paid for various independent tests to try to compromise the system, all of which have failed.

    This is because Stealth uses four layers of security: each packet is encrypted with AES256, then split into three separate pieces and dispersed across the network, destined for a particular group of users that have to be running its protocols.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page