Skip to main content

Only 3 people are controlling the Internet?

There’s this group of nerds called ICANN—the Internet Corporation for Assigned Names and Numbers, and they have handed out seven keys to seven individuals spread across the world, and with those keys, you can shut down, and reboot, the internet. 

Now normally, this is where I would make a bunch of bad jokes, and call them stuff like the Fellowship of the Keys, or the Key-I Joes, or You, Key, and Dupree, but we don’t have time for that, because to understand these keys, you need to understand a bunch of complicated internet stuff that was very confusing for me to figure out, starting with DNS. In case you don’t know what DNS is, because, I dunno, you had friends in college, I’ll explain: all the computers that make up the internet are identified via long numbers called IP addresses; but when I want to go to, for example, Twitter, because I want to scroll through an endless mix of hot takes, anger, harassment, product placement, and videos of Kanye West saying problematic things but then it turns out that he’s actually a cake, I don’t want to have to type in 199.59.148.0—which is the IP address of one of the servers that hosts Twitter. I just want to type www.twitter.com, and then be taken there so I can get to my seeing-photos-of-people-partying-during-Covid induced panic attack. 

So my computer has to translate www.twitter.cominto the right IP address, and it does that first by asking a whole long line of things—first, of course, it asks Clippy, but Clippy doesn’t know. So instead, it asks your Operating System, which maybe knows, but if it doesn’t it asks something called a recursive name server, which also maybe knows, but if it doesn’t it asks of the world’s 13 root servers, which send you to the appropriate top-level domain server—in this case, the one that runs all the .coms—who sends you to the right authoritative name server, which eventually is like “oh yeah, twitter is 199.59.148.0.” But you need someone to administer this whole system—to make sure, first of all, that IP address aren’t handed out willy nilly, and more importantly, to keep everything secure, so people can’t come in and mess with it, and say “hey check it out, the IP address for irs.gov is actually this IP address, which goes to a site called free-money-just-give-me-your-bank-info-first.totally-legit.net. 

So the DNS is authenticated through a system called DNSSEC. And I promise we’re going to get to their mystical internet keys soon, but first, you need to understand how DNSSEC works. The first important idea is asymmetrical encryption ,which involves a private key and a public key, which are long numbers that are linked mathematically. The public key is a number everybody can know, but the private key is very secret, and only held by one entity. And this is what’s important: with the private key, you can make something called a digital signature over a document, that someone can, by looking at the corresponding public key, go, “oh man, based on what this public key says, I know that that signature was definitely made by the person with the corresponding private key.” And that’s how DNS is authenticated—the information saying “twitter.com is 199.59.148.0” is signed by Twitter using their private key, and then my computer uses Twitter’s public key, looks at the signature, and says, “yep, this signature was definitely made using Twitter’s private key, so the information must be legitimate.” 

The problem is, we have to be sure that Twitter’s public key, off of which I’m basing this analysis, is legit too. So Twitter’s public key is signed by a higher authority, the top-level domain server who runs all dotcoms, using their private key. And then I use their public key to be like, “yup, this signature was made by the dotcom people.” But to know that public key is legit, it’ssigned by an even higher authority, up and up and up, until it’s signed off on by ICANN, that nonprofit I mentioned earlier, using a single private key. Every single website’s IP address in DNS is ultimately secured by ICANN’s single public and private key, which is called the trust anchor. In fact, I can even show you ICANN’s public key—It’s this. And I shouldn’t say this, but, their private key, the super top-top-top-secret number that secures the whole internet, is seven… four…two—okay look I don’t know their private key, I just wanted you to think I’m cool. Now, the numbers that make up the private key that secures the whole DNS are stored on hardrives inside physical boxes, called Hardware Security Modules, or HSMs for short, or H’s for shorter, or “huh’s” for shortest, and there are four of them, kept in pairs in ICANN stations 2,500 miles apart: one in Culpepper, Virginia and one in El Segundo, California. Once you get past the armed guards and pin pads, and card scanners, and biometric security stops, and sword-fighting bears, to get into those physical HSM boxes that hold that secret number, you need several smart cards, and those smart cards are kept inside other boxes, which can only be opened with physical keys, which are… finally, held by seven people across the world. Oh, I was kidding about the sword-fighting bears, by the way—ICANN actually uses nun chuck wielding fish. The key-holders aren’t world leaders oranything, but just security experts designated by ICANN.

 In fact, I can show you who they are: it’s these people. I know, not that exciting. Should DNS ever be compromised, five of the seven key-holders would have to go to an ICANN facility, use their keys, in what’s called a “key ceremony” to get to the smart-cards, then use those smart-cards to physically open the box with ICANN’s private key in it, and use that to shut DNS, and with it much of the functionality of the internet, down, and reset it. Some people say the keyholders are the most powerful people in the world. But whoever said that is an idiot, because clearly the most powerful people in the world are the Half As Interesting commenters who spent literal years demanding that we make a video about bricks, because guess what: we finally did it. And it’s way way more than just another HAI video—it’s a 40-minute long special called The Brick Façade:

Thank You

Comments

Popular posts from this blog

The incredible history of China's terracotta warriors -

What happens after death? Is there a restful paradise? An eternal torment? A rebirth? Or maybe just nothingness? Well, one Chinese emperor thought that whatever the hereafter was, he better bring an army.  We know that because in 1974, farmers digging a well near their small village stumbled upon one of the most important finds in archeological history: vast underground chambers surrounding that emperor's tomb, and containing more than 8,000life-size clay soldiers ready for battle.  The story of the subterranean army begins with Ying Zheng, who came to power as the king of the Qin state at the age of 13 in 246 BCE. Ambitious and ruthless, he would go on to become Qin Shi Huangdi, the first emperor of China after uniting its seven warring kingdoms. His 36 year reign saw many historic accomplishments, including a universal system of weights and measures, a single standardized writing script for all of China, and a defensive barrier that would later come to be known as the Great ...

The wealthiest person who ever lived - Musa Keita

If someone asked you who the richest people in history were, who would you name? Perhaps a billionaire banker or corporate mogul, like Bill Gates or John D. Rockefeller. What about African King Musa Keita I?Ruling the Mali Empire in the 14th century CE, Mansa Musa, or the King of Kings, amassed a fortune that possibly made him one of the wealthiest people who ever lived. But his vast wealth was only one piece of his rich legacy. When Mansa Musa came to power in 1312, much of Europe was racked by famine and civil wars. But many African kingdoms and the Islamic world were flourishing, and Mansa Musa played a great rolein bringing the fruits of this flourishing to his own realm. By strategically annexing the city of Timbuktu, and reestablishing power over the city of Gao, he gained control over important trade routes between the Mediterranean and the West African Coast, continuing a period of expansion, which dramatically increased Mali's size.  The territory of the Mali Empire was ri...

Santizer VS Soap / Which is best for Corona ?

Your hands, up close, are anything but smooth. With peaks and valleys, folds and rifts, there are plenty of hiding places for a virus to stick. If you then touch your face, the virus can infect you. But there are two extraordinarily simple ways you can keep that from happening: soap and water, and hand sanitizer. So which is better?  The coronavirus that causes COVID-19 is one of many viruses whose protective outer surface is made of a lipid bilayer. These lipids are pin shaped molecules whose heads are attracted to water, and tails are repulsed by it. So in water-rich environments, lipids naturally form a shell like this, with the heads outside and the tails inside. Their shared reaction to water makes the lipids stick loosely together— this is called the hydrophobic effect. This outer structure helps the molecular machinery of the virus break through cellular membranes and hijack our cells. But it has thousands upon thousands of weak points where the right molecules could pr...