SlideShare a Scribd company logo
SYDO – Secure Your Data by Obscurity Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
Let's make some research :-)
Before that, what problems do we have? mistrust in hosting provider aims security problems data stealing using SQL Injections …  or after server was hijacked etc. etc.
“ Information”   one the most dangerous weapons you have it, you rule ...money, women and finally the world take a look at Google, Facebook, M$ etc.
We should be more careful!
But we are lazy...
We introduce SYDO aims to protect your data stored in SQL databases a built-in interface for SQL functions based on client/server API help you to store and manage your data
How it works?
The problem divided in layers Low Level processing (SQL Interfaces) SYDO Medium Level processing (here we can add patches over SQL queries) High-level processing (WAFs, htaccess etc.) Post-processing (client side)
Solution data (rows/tables/databases) encrypted with AES 128 keys stored in SYDO Hash Center (remote - server) unique identification key + AES keys related SQL Query identification by generating a key stub(Anti-SQLI) RESTful encrypted API protocol between Client and server
Demo
Features support over multiple SQL interfaces API statistics multiple website management for SYDO Hash Center P2P Hash Center Service (lower latency) cache over SYDO Hash Center (even lower latency) Anti-DOS for SYDO Hash Center
Project Status available on GitHub v.01 Alpha http://bit.ly/o6qzjn soon update!
Important SYDO is not bullet proof but is a better solution!
Questions?
 

More Related Content

PPT
SYDO - Secure Your Data by Obscurity
PPT
How you can become a hacker with no security experience
PDF
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
ODP
Wordpress Plugins Scanner
PPT
DefCamp 2012 @Bucharest
ODP
A journey through an INFOSEC labyrinth
ODP
Polish the Wheel
PPT
Virtual Anonimity – What? Why? When? How?
SYDO - Secure Your Data by Obscurity
How you can become a hacker with no security experience
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Wordpress Plugins Scanner
DefCamp 2012 @Bucharest
A journey through an INFOSEC labyrinth
Polish the Wheel
Virtual Anonimity – What? Why? When? How?

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hindi spoken digit analysis for native and non-native speakers
What is a Computer? Input Devices /output devices
DP Operators-handbook-extract for the Mautical Institute
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cloud_computing_Infrastucture_as_cloud_p
Enhancing emotion recognition model for a student engagement use case through...
Group 1 Presentation -Planning and Decision Making .pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Chapter 5: Probability Theory and Statistics
Univ-Connecticut-ChatGPT-Presentaion.pdf
OMC Textile Division Presentation 2021.pptx
Programs and apps: productivity, graphics, security and other tools
observCloud-Native Containerability and monitoring.pptx
Hybrid model detection and classification of lung cancer
Web App vs Mobile App What Should You Build First.pdf
Developing a website for English-speaking practice to English as a foreign la...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Module 1.ppt Iot fundamentals and Architecture
Getting started with AI Agents and Multi-Agent Systems
Hindi spoken digit analysis for native and non-native speakers
Ad
Ad

SYDO - Secure Your Data by Obscurity

  • 1. SYDO – Secure Your Data by Obscurity Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
  • 2. Let's make some research :-)
  • 3. Before that, what problems do we have? mistrust in hosting provider aims security problems data stealing using SQL Injections … or after server was hijacked etc. etc.
  • 4. “ Information” one the most dangerous weapons you have it, you rule ...money, women and finally the world take a look at Google, Facebook, M$ etc.
  • 5. We should be more careful!
  • 6. But we are lazy...
  • 7. We introduce SYDO aims to protect your data stored in SQL databases a built-in interface for SQL functions based on client/server API help you to store and manage your data
  • 9. The problem divided in layers Low Level processing (SQL Interfaces) SYDO Medium Level processing (here we can add patches over SQL queries) High-level processing (WAFs, htaccess etc.) Post-processing (client side)
  • 10. Solution data (rows/tables/databases) encrypted with AES 128 keys stored in SYDO Hash Center (remote - server) unique identification key + AES keys related SQL Query identification by generating a key stub(Anti-SQLI) RESTful encrypted API protocol between Client and server
  • 11. Demo
  • 12. Features support over multiple SQL interfaces API statistics multiple website management for SYDO Hash Center P2P Hash Center Service (lower latency) cache over SYDO Hash Center (even lower latency) Anti-DOS for SYDO Hash Center
  • 13. Project Status available on GitHub v.01 Alpha http://bit.ly/o6qzjn soon update!
  • 14. Important SYDO is not bullet proof but is a better solution!
  • 16.