Science fiction, prolific as it is, has shown us on numerous occasions how we will use the screens in the future.Or, at least, how they are expected to be used.a television to transfer files (Star Trek, Minority Report, The Expanse, Black Mirror...).
Far from being a futuristic concept, the company Keyssa (hardware manufacturers) seeks to reinvent the way in which we transmit information locally wirelessly, with solid and secure state technology, and wants to do it with a kiss: the Kiss Connectivity .
Kiss Connectivity, the new file transmission standard based on the kiss
It is a proven fact that every time we generate more data, but also that we want that data to be protected from prying eyes.And here it does not matter if we talk about confidential company files or personal photographs that we do not want to air: we seek some privacy , and technology can help us to shield it to a large extent, for example, when we transfer that data from one device to another .
If a few years ago the king of transfers was the cable (camera to computer, mobile to computer, and even computer to computer) today is the WiFi network.We sent everything through the router because, usually, We send information away from us: to our social networks, to our blog, to friends through WhatsApp...What happens if we want to send files locally ?
Keyssa has designed a new method for transmitting files in this way through a electromagnetic base connection , very similar to the way some mobile phones are charged.A current is emitted through the electromagnet at the base of the emitting device, which emits perpendicular magnetic pulses.These are intercepted by the electroiman of the receiving device and transcribed into data.
The speed that can be achieved through this method is very high, of the order of 6 Gbps .As they say on their website, that is «a 1GB movie in just under two seconds».In addition, it uses the battery resources of both devices relatively well when transmitting or receiving information.
A physical protocol that reinforces security
One of the great advantages of this type of methods is the security it provides compared to other systems, and we explain it with two analogies:
You don't need a server or a router to work , since data transmission is carried out from device to device.We think we want to stream a private video or a personal photo session of a mobile phone to a computer.We have several options:
Make use of a online storage service such as Dropbox or Google Drive to host the content on an external server, generate a link and open it on the device where we want to view it.
Do the same but with your own server, at our home.It is somewhat safer, but still interceptable.
Go from servers and use end-to-end encrypted services as BitTorrent Sync (now Resilio), so that nothing is registered in a fixed place.
Make use of slow technologies such as infrared and Bluetooth.
Use Kiss Connectivity, or a similar technology, that sends files from point to point without intermediaries and without using WiFi.
Of the alternatives above, Kiss Connectivity is the safest (for now) due to the enormous difficulty in intercepting information between devices.
It is similar to puncturing the line between two radio links of telecommunications towers (those white drums that are seen on them).To achieve this, you have to place yourself on the line Straight formed by two of them, tens of meters high.To commit a similar digital crime between two devices that are kissing , one would have to literally get between them.It seems unfeasible.
Some obsolete wireless methods
It is not the first time that a definitive wireless method has emerged.Many years ago mobile phones (and some consoles, such as Game Boy Color) included an infrared sensor .It really is a fairly safe technology , since the beam has to be continuous and the devices must be close together, so that there is a transfer, but it is slow.
A few years later, the Bluetooth protocol became popular, and today it allows us to connect all our wearables in a sort of personal cloud around us.The problem? Avoiding their security is relatively straightforward, and they are often used to coordinate global cyberattacks when they connect to the network via 4G or WiFi from the smartphone.
With the arrival of the applications, some developers launched some quite curious to consider, such as Bump (which no longer exists, that was a success) or AirDroid (which no longer has the functionality we are talking about) The mechanism was to share at once, at once, when two smartphones with the same app detected the same collision on their sensors (accelerometer), they were paired via data or WiFi, being able to share files.
As new technologies emerge, our patterns of use change.It is possible that a system like the Kiss of Kiss Connectivity will facilitate the file sharing, especially at the domestic and office level .However, this technology can only be applied at a very short distance .
Images | iStock/stevanovicigor, iStock/lcs813, iStock/Blackzheep
Comments
Post a Comment