by Matt S.

     On Tuesday, July 15, 2014 Google revealed that it would be launching ‘Project Zero’ which would include a team of researchers working in real time. Once a software bug is found online, Google’s secret team will report it to the vendor and file the vulnerabilities in a public external database for discussion. Will it be useful or will it attract hackers to a source of bugs on the web? Google proposes that ‘Project Zero’ will help find vulnerabilities before anyone else does. Is this really a marketing ploy?
     Criminals and intelligence agencies normally exploit these vulnerabilities around the Internet but Google plans to help get these problems fixed. Chris Evans, a member of Google’s security research team wrote, “People deserve to use the Internet without fear that vulnerabilities out there can ruin their privacy with a single website visit. We are going to try and focus on the supple of these high value vulnerabilities and eliminate them.” Project Zero will essentially prevent software bugs from happening before they actually occur. How Google will pull this off? It plans to use 100% of their time and resources to protect and make the Internet security better.
     Why is Google doing this? Google has attempted to increase their security since Edward Snowden’s spying events. In addition, Google has encrypted its links to prevent the NSA from spying on the Google user information. However the real question is will Google be able to find software exploits before they happen? The only way to do this is to erase the buggy code as its created, which they call “bug collisions,” the same tacit that hackers use. What hackers do is string together computer codes, which are several lines of code that are vulnerable and then execute that code to bring down a computer’s defenses. In order to render a hacker’s attempt useless you would essentially just have to bring down one part of the code and the entire attack fails. This strategy will hopefully help Google make the Internet a safer place for everyone to browse.               

Source(s): , ,,



Your comment will be posted after it is approved.

Leave a Reply