• Image 01
  • Image 02
  • Image 03
  • Image 04
  • Image 05
  • Image 06
Need assistance? Contact Us: 1-800-255-5897

Menu

  • Home
  • About Us
    • Company Overview
    • Management Team
    • Board of Directors
  • Your Loan Service Center
  • MAKE A PAYMENT
  • Business Service Center
  • Contact Us
  • Home
  • About Us
    • Company Overview
    • Management Team
    • Board of Directors
  • Your Loan Service Center
  • MAKE A PAYMENT
  • Business Service Center
  • Contact Us
Recent Quotes
View Full List
My Watchlist
Create Watchlist
Indicators
DJI
Nasdaq Composite
SPX
Gold
Crude Oil
Markets
Stocks
ETFs
Tools
Markets:
Overview
News
Currencies
International
Treasuries

Node in 5ireChain to be Attested with Hardware Root of Trust

By: AB Newswire
May 04, 2022 at 17:20 PM EDT

In the face of increasing sophistication of cyber attacks, the need for an immutable security protocol cannot be downplayed. The hardware components of a network infrastructure can be the point of penetration into a network. With malicious code installed in a hardware, the entire network can be taken down by attackers. 5ire is using Hardware Root of Trust to ensure that the program running on their nodes is malware-free. 

Node in 5ireChain to be Attested with Hardware Root of Trust

In network computing, one thing is certain, there is a threat nearby. But the fear remains the uncertainty of the next victim. 

While the computing world looks for an ultimate solution to secure their network perimeter from existing threats, cyber attackers are committing as much hard work to develop a malware that will penetrate the most secured network. 

Cyber warfare continues as security gets more sophisticated and comprehensive. However, as the world gets more decentralized and connected, new loopholes are inadvertently created.  The incentives of a successful penetration into a network gets more juicy and attackers will never sheath their sword. 

The security of a network is considered a priority. This is even more the case with blockchain networks as they grapple with the trilemma. 

In a bid to deploy a foolproof security layer to the 5ireChain network, 5ire is utilizing hardware root of trust at the foundation of its security layers.

How Hardware Root of Trust Works

Hardware root of Trust is a security protocol that embeds security to the hardware component of a network infrastructure. Here the security layer descends beyond the software aspects. 

Hardware RoT is the first coach in a chain of security protocols. It works with TPM burned into the hardware infrastructure by the manufacturer, attesting that the program running in the hardware is not infected. This is a zero-trust security model because the need to trust the program is eliminated while guaranteeing its safety with a manufacturer-embedded security. 

5ire ensures that all nodes in the 5ireChain ecosystem  establish a certain level of trust. 5ire is introducing a hardware-based root of  trust based on Trusted Platform Module (TPM) technology. 

A TPM device will  allow 5ire nodes to remotely attest devices for any malicious code. TPM  contains a key pair called an Endorsement Key (EK). This is burned inside the  TPM device at the time of manufacture and even the manufacturer does not  know the private key as it is generated inside the TPM device using a random  seed. 

EK cannot be used to directly sign any piece of data, rather it is used to  generate another key pair called the attestation key (AK). An AK can be used  to sign attestation data inside the TPM device. This data is stored in platform  configuration registers (PCR), which act as applications’ hashes, starting when  the node starts and assisting in identifying malicious applications running on  a node. 5ireChain will ensure that all the block-assembling nodes participating  in the network are running similar applications when they boot.

The target of cyber attacks has gone beyond the software a computer is running or its network infrastructure to include the hardwares in which these programs are hosted. The role of hardware in a security outfit is paramount to the integrity of the entire security network. This is because software security is irrelevant if the hardware is already tampered with. 

With hardware RoT, the operating system running in a hardware device is scrutinized to ensure it is not infected. Since this security layer is embedded to the hardware and cannot be changed, it provides an impenetrable security layer on which other security layers directly or indirectly depend on.

Media Contact
Company Name: 5ire
Contact Person: Vilma Mattila
Email: Send Email
Country: United Kingdom
Website: https://5ire.org


More News

View More
News headline image
Why Silver Beat Gold and the S&P in 2025—And What Comes Next ↗
Today 11:44 EST
Via MarketBeat
Topics Stocks
Tickers SLV
News headline image
5 Healthcare Names to Watch as Sector Rotation Is in Full Swing ↗
Today 10:51 EST
Via MarketBeat
Tickers AMGN GILD IBB JNJ LLY NVDA
News headline image
NuScale's Shocking Q3 Was a Bullish Signal in Disguise ↗
Today 10:22 EST
Via MarketBeat
Tickers FLR SMR
News headline image
Is Netflix Making a Calculated Play for the Dow Jones? ↗
Today 9:32 EST
Via MarketBeat
Topics Stocks
Tickers NFLX
News headline image
Micron's $338 Target: The AI Memory Supercycle Is Just Starting ↗
Today 8:29 EST
Via MarketBeat
Topics Artificial Intelligence
Tickers MU

Recent Quotes

View More
Symbol Price Change (%)
AMZN  234.41
+1.19 (0.51%)
AAPL  279.73
+0.88 (0.31%)
AMD  219.24
+1.71 (0.79%)
BAC  53.56
-0.09 (-0.16%)
GOOG  318.22
-1.90 (-0.59%)
META  643.70
-4.25 (-0.66%)
MSFT  489.13
-2.88 (-0.58%)
NVDA  180.01
+3.01 (1.70%)
ORCL  201.91
-0.03 (-0.02%)
TSLA  430.49
+0.32 (0.07%)
FinancialContent
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.
© 2025 FinancialContent. All rights reserved.

Having difficulty making your payments? We're here to help! Call 1-800-255-5897

Copyright © 2019 Franklin Credit Management Corporation
All Rights Reserved
Contact Us | Privacy Policy | Terms of Use | Sitemap