Elon Musk has announced that ‘X’ is currently under heavy cyber attacks, probably from Ukraine.
If he were to host ‘X’ on ICP with its canister system, would that make ‘X’ immune to any and all cyber attacks?
Elon Musk has announced that ‘X’ is currently under heavy cyber attacks, probably from Ukraine.
If he were to host ‘X’ on ICP with its canister system, would that make ‘X’ immune to any and all cyber attacks?
No. No system can be immune to “any and all cyber attacks.” You need to define an attack scenario and then you can explore that situation. Blockchains are by nature more resilient to malicious data center operators, outages across large parts of the world, and often also ddos attacks since one or a few nodes getting taken out does not affect the system as a whole too much. But every blockchain (just like every other system) has its tolerances for things that can break before service deteriorates
It might be a problem to keep selling this, I feel like it makes us look bad (aside from all the crypto stuff ).
I read malicious nodes can inspect code and or read data stored in canisters
I am not aware of any security breaches on ICP…but being a noob here what do I know??
Anyone aware of any security problems at anytime with any site hosted on ICP?
As a long-time software engineer, I can honestly tell you that I won’t even look at something that claims to solve “everything” (or even fully solve “something”). No trade-offs, no compromises, simply means that I will have to find them out the hard way. No, thanks.
That is true. Data stored on the IC is not truly private (unless you encrypt it and hold on to the keys). Blockchains and decentralized networks, by their very nature, must rely to some degree on state being publicly accessible (whether it’s Bitcoin, where all the blocks are available to everyone; or the IC, where the subnet state is “only” available to 13 or 40 node operators).
There is some ongoing effort to enable the use of Secure Encrypted Virtualization (SEV) on specific subnets, in order to provide more privacy; but keep in mind that Google just published a fully working toolkit to not only break SEV but completely rewrite the microcode of most AMD CPUs. And historically, (and for good reason) it has proven nearly impossible to build a secure CPU enclave that can’t be broken into (it’s somewhat similar to me renting out my backyard to someone and them expecting to be able to run a nightclub there without my ever finding out about it).
I’m not a security engineer, so I’m not privy to everything security related. But to my knowledge, beyond the odd node operator taking a peek at canister data (which is not trivial; and most node operators either aren’t technical enough or just don’t care; but also, it’s not something anyone would likely find out about) I don’t think any breach of the protocol happened. Some apps got hacked (although I believe abused is a better term); one broke and needed support from DFINITY / the NNS to get restarted, etc. But as said, to my knowledge, that’s all.
Are you referring to ICP being "tamper proof"and unhackable claim by Dom?
Yes, that is exactly what I am referring to