当前位置:网站首页>Cybersecurity and the Metaverse: Identifying Weak Links
Cybersecurity and the Metaverse: Identifying Weak Links
2022-08-05 02:49:00 【software testnet】
译者 | 布加迪
审校 | 孙淑娟
When you scroll through numerous social media platforms,Often turn to read just opened a new restaurant reviews,Login or most often around the virtual retailers for mother to buy a birthday gift,May not think online there are changes in life.不过,Present situation of digital would probably not for too long.
的确,Many profound sign of impending change.Zuckerberg最近将Facebook改名为Meta.Microsoft is now paying close700亿美元收购游戏巨头动视暴雪.Even the iconic fashion companyRalph LaurenAlso launched a series of virtual clothing and accessories.
那么,What caused such a huge changes in technology and business?The reason why you should pay attention to?这就是元宇宙,It became very popular in the tech world.You may have heard of the term,But maybe don't know the real meaning.
1.了解元宇宙
简而言之,Yuan the universe is a new enhanced version Internet,It USES the virtual reality and augmented reality(AR/VR)Provide fully immersive experience online world.换句话说,It is such a kind of Internet:“您”In the form of online avatar work、娱乐、学习、Shopping and dating,Like in the real environment.
本质上,Yuan of the universe is a substitute for the physical world,But no physical limitations of the world,Such as geographical distance limit or real living obstacle.
听起来很令人兴奋?是的,但有一个缺点.专家们预测,Yuan will enlarge now online universe of existing network security challenges,At the same time brought many new challenges,Including today can predict the challenges and unpredictable challenges yet.
比如说,研究表明,Network security threats and network crime is on the rapid increase in,年同比猛增50%.有预测认为,到2025年,The cost of network crime each year will more than10万亿美元,The main business objectives may not be a financial or commercial industry.相反,Other key industries are become the target of cyber crime,比如房地产、Education and agricultural.
If there is an alternative toWeb2的元宇宙,专家警告,These trends will only deepen,The consequences of network crime may like yuan the universe itself,The consequences of exceeding enlarge the current crime.
2.身份安全
Yuan universe aims to through the use of the number of each user to create their own avatar to work.乍一看,This incarnation will be unique and safe,Allow it to represent the real using their personal identity information(PII)And other sensitive information,来购买商品、Engaged in the work even for medical treatment.
此外,Through the embodiment,The user can interact with others in the digital space,Included in the virtual office to work with colleagues.The problem is that the incarnation is the master key that private offline information,从PIITo financial account,If an attacker obtained your avatar,They would be tantamount to can open the door,A peek at your all.This likely will increase identity theft to an unprecedented level.然而,Yuan identity theft may also occur in the universe a more sinister change.If an attacker control your avatar,Is likely to damage your relationship and reputation behavior,May even jeopardize your safety.
The identity of the form of a special concern is“深度伪造”,The criminals in the digital space as the other one.There have been fake video online depth of celebrities and ordinary people,Using complex technology,The depth of fake and real almost cannot.
3.NFTAnd the currency con
Yuan universe will play a role through its own monetary form,包括比特币等加密货币,As well as various types of non homogeneous tokens(NFT).虽然NFTAnd encryption currency can be accumulated in yuan universe、交换、Cost or lost,As legal tender in the physical world to use,But the process began in the use of traditional currency to buy these digital currency.
Just like in the physical world,Crooks and thieves will flock to anything of value,Yuan universe while still in its early stages,But has become a serious scam hotspot.事实上,It is estimated that only in2021年,Hustler to encryption monetary value is more than140亿美元.
比如说,臭名昭著的HyperverseScam that yuan universe residents have the opportunity to use encryption money to buyNFT门票,RMB to buy tickets for the concert series in the universe.The campaign hype,Not only in yuan universe hype,In the traditional media and social media hype,The result has caused great interest.迄今为止,There is no evidence that any publicity activities is really happened.
值得注意的是,Because the yuan theft usually involves block chain technology in the universe,Law enforcement is almost impossible to track the culprit.This is a result of the chain block the decentralized nature of,It will remove with chain(chain of possession)的所有记录.
4.Biometric identification and data hacking
Yuan universe may face many network security threats,Most disturbing is the threat of biometrics hacking risk.Because the yuan universe throughVR/AR来运作,Users need to wearVR头戴设备,May also need to use otherVR/AR技术,比如触觉手套.
These may be used in yuan certain aspects of the universe,Used for biometric recognition,Such as through iris scanning.But critics worry that,Hackers may gain access to the biological characteristics of,Not only can let them access to sensitive account,Can also access to the user's private information on body function and health status.
鉴于FacebookSuch as company always practice with arbitrary data collection,The problem is especially worrying.Critics like that,如果 Meta Such as platform can access the end user of a large number of biometric data,These data files may be black,或者更糟糕的是,Without the permission of the end user is sold.
5.人身安全
Yuan universe immersive environment may make the personal safety of the end user in offline be.比如说,If an attacker control someone's account,Maybe they can manipulate the avatar in the virtual world to see、Hear and do.
然而,Yuan activity in the universe is very easy to translate into physical activity in the world.Yuan universe immersive experience means that the user can easily get lost,Because their senses no longer perceive the actual physical environment.Hackers may manipulate yuan cosmic environment,So that users on the body to respond,But I do not know the physical environment around.Because hackers may manipulate the end user,Imperceptible to traffic or down the stairs,This may even lead to life-threatening cases.
Whose children are in yuan universe parents play games,The problem is particularly worrisome.幸运的是,Still can monitor in yuan the universe moves of playing a game,Such as to ensure that the children will be the game world projection to family on TV,So that parents can better supervise.
Yuan universe is indeed a new new world,Is promising and potential.Yuan universe is likely to change our work、学习、娱乐和社交的方式.然而,Yuan universe network security threat is very serious and practical,Yuan creator of the universe、政府、Businesses and ordinary citizens have a responsibility to understand and prevent these risks.
原文链接:https://venturebeat.com/2022/06/26/cybersecurity-and-the-metaverse-identifying-the-weak-spots/
边栏推荐
- OpenGL 工作原理
- shell statement to modify txt file or sh file
- 软链接引发的物理备份问题
- Simple description of linked list and simple implementation of code
- Beidou no. 3 short message terminal high slope in open-pit mine monitoring programme
- Programmer's Tanabata Romantic Moment
- C student management system Insert the student node at the specified location
- 开源协议说明LGPL
- QT MV\MVC结构
- 【Daily Training】1403. Minimum Subsequence in Non-Increasing Order
猜你喜欢

2022-08-04: Input: deduplicated array arr, the numbers in it only contain 0~9.limit, a number.Return: The maximum number that can be spelled out with arr if the requirement is smaller than limit.from

QT MV\MVC结构

链表的简单描述及代码的简单实现

Study Notes-----Left-biased Tree

The linear table lookup
![[ROS] (10) ROS Communication - Service Communication](/img/4d/4657f24bd7809abb4bdc4b418076f7.png)
[ROS] (10) ROS Communication - Service Communication

C language diary 9 3 kinds of statements of if

Ant Sword Advanced Module Development

Common hardware delays

Matlab drawing 3
随机推荐
How Jin Cang database correctness verification platform installation file
Distributed systems revisited: there will never be a perfect consistency scheme...
In 2022, you still can't "low code"?Data science can also play with Low-Code!
1484. Sell Products by Date
QT语言文件制作
HDU 1114:Piggy-Bank ← 完全背包问题
nodeJs--encapsulate routing
Open Source License Description LGPL
北斗三号短报文终端露天矿山高边坡监测方案
1873. The special bonus calculation
Images using redis cache Linux master-slave synchronization server hard drive full of moved to the new directory which points to be modified
[Storage] Dawning Storage DS800-G35 ISCSI maps each LUN to the server
01 [Foreword Basic Use Core Concepts]
VSCode Change Default Terminal 如何修改vscode的默认terminal
C student management system Find student nodes based on student ID
基于左序遍历的数据存储实践
How to transfer a single node of Youxuan database to a cluster
Simple description of linked list and simple implementation of code
QT: The Magical QVarient
LeetCode uses the minimum cost to climb the stairs----dp problem