Current Internet is NOT Security

The origins of the Internet date back to research commissioned by the United States Federal Government in the 1960s to build robust, fault-tolerant communication via computer networks. The linking of commercial networks and enterprises in the early 1990s marked the beginning of the transition to the modern Internet, and generated rapid growth as institutional, personal, and mobile computers were connected to the network. By the late 2000s, its services and technologies had been incorporated into virtually every aspect of everyday life. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address (IP address) space and the Domain Name System (DNS), are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN).

The original sin of operators

DNS hijacking

DNS is the abbreviation of “Domain Name System”. It can map the domain name and IP address, which can make people access the Internet more conveniently. So we don’t need to remember complex IP addresses.
DNS hijacking has three situations:
1. Error domain name to error correction navigation page, navigation page exists advertising.
2. Error DNS to non normal page, on the basis of DNS error to the navigation page, there is a certain risk analysis to some malicious sites, these malicious sites by judging the HOST, URI, referrer you visit and other targets to determine whether jump to ad pages. This situation is likely to lead to a jump advertising page (domain name wrong) or visit the page with advertising (some elements on the page load time domain error trigger) . This kind of hijack will judge the user access to the target HOST, URI and referrer etc, to determine whether the analysis of malicious site address, not easy to be found.
3.Analysis the specific sites directly to malicious or advertising pages, this situation is bad, but not necessarily from the operators, router, system has been invaded, some nodes from operators are maliciously controlled by third party are possible.

HTTP hijacking

The IP address of your domain name is not the same as DNS, but it hijacked your request in the process of interacting with the website and returned the request to you before the website sent you the information. When the normal access to a non advertising page, the page appears advertising popups, it is likely that the operator hijacked HTTP.
About DNS and HTTP hijacking, DNS hijacking like that you want to save money but operators pull you into the hands of robbers; HTTP hijacking like from the server you bought a bag of snacks but also got some SHIT on it.
If you encounter a similar situation, you can call the operator firstly. If the operator does not solve, have to complaint to the government.

Router backdoor

Routers are the bottom entry of individual users in the Internet world, or the physical gateway to the users. For a long period of time, routers have not been attached much importance to.

Cruel truth

Sometimes you buy a router with more than one backdoor:
1. suspected theft of user privacy
2. ultra vires restart
3. access to the routing background administrator account
4. unauthorized access to the WIFI password  

Why they do these?

1.hijack traffic
When you connect to the WiFi in your home and download an App. As a result, the App has been replaced mysteriously.
2. steal user’s privacy
That is so called “big data”, because of the existence of the back door, your preferences and privacy on the Internet are clearly touched, and if these data are sold to the E-Commerce, you can be “accurate” advertising.
3. active or passive as a springboard for network attacks
On the Internet, attacks and intrusions happen every day. For a website, if there are a lot of attacks from a IP, you can easly block it. But in recent years, more and more sources of attack become difficult to locate, many IP are positioned to personal broadband users, and broadband users are clearly not really invaders. The router backdoor for hackers to attack the site opened convenient ways, and even some manufacturers will take the initiative to this part of the back door as a resource to sell. Some hackers with high technical means will attack this kind of routing node initiatively, and then use it as a springboard to attack other websites. Many websites are completely exposed to attack, and cannot track the source of attack.

How we can solve all the problems?

Spaco will be the solution which can realize a no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies really.