Data in the public resource area will

This is the most common implementation method Data in at present? area will but it cannot be called optimization as mentioned in the subtitle? it can only be regarded as simplification. This simplification is more or less a bit of “self-deception”.

Of course? this method is not completely useless. The media will emphasize that Data in  advertisers’ data will be isolated and protected under “trusted hardware technology”? and operations on advertisers’ data will also be performed within these hardware and will not be leaked outside these hardware.

Trusted hardware technology is also commonly known as the “data security island” in the industry.

Trusted hardware technology mainly area will

Slves the following problems:

1. Data separation : Data stored in a exploring whatsapp features: tips for business and personal use partition cannot be read or tampered with by other partitions. In other words? the ID used by advertisers for secure transactions will not be placed anywhere other than trusted hardware.

2. Temporal separation :   not leak data information in any partition. Computing resources? such as CPUs? also have dedicated isolated time slices to process data in trusted hardware.

3. Control of information flow : Partitions cannot on threats to members of the communicate with each other unless they have special authorization.

 Fault isolation

Security vulnerabilities in one partition cannot and aero leads data spread to other partitions. If the media strictly adopts trusted hardware technology and management? it can indeed ensure that the ID provided by the advertiser is not used for other purposes. Of course? we can see whether the media can strictly self-discipline. We can see that they have obtained the certification of the execution standards? such as the “Information Security Technology Trusted Execution Environment Service Specification” certification. However? certification cannot be 100% trusted. Which media is qualified and which media is not qualified is beyond the scope of this article.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top