Because we are completely aware of the importance of cyber security and data privacy in the modern age, the following article will explain the security measures that the Motivus Framework employs to ensure that your device, and your data, is perfectly safe.
A sandboxed environment is an effective way to improve your device’s security. It is designed to prevent threats by isolating apps from each other.
Because sandboxing keeps apps in a siloed system, these won’t infect or cause damage to the host machine or operating system.
Motivus is hosted on WebAssembly, where they have implemented a security model that has two important goals. As stated on the official WebAssembly site, their goals are to:
(1) Protect users from buggy or malicious modules, and (2) provide developers with useful primitives and mitigations for developing safe applications, within the constraints of (1).
For user’s security, each WebAssembly module is executed within a sandboxed environment separated from the host runtime using fault isolation techniques. This implies:
- Applications execute independently, and can’t escape the sandbox without going through appropriate APIs.
- Applications generally execute deterministically with limited exceptions.
WebAssembly and other companies have also created the Bytecode Alliance, where they are seeking to achieve full security in WebAssembly applications through a system called Nanoprocesses.
When it comes to cybersecurity, the essence of the problem is the access that malicious code has when it spots vulnerabilities in the application’s code. This is why restricting access is the way to achieve security.
Lin Clark’s cartoons show how WebAssembly employs data security and shows how in order for malicious modules to carry out an attack, it needs to access the resources and APIs that it shouldn’t have permission to go into.
WebAssembly isolates the different modules from each other and gives them fine-grained permissions to particular parts of the file system while shielding it from other parts. Read more about it on the article Building a secure by default, composable future for WebAssembly.
See that lock icon to the left of the URL in the browser’s address bar? That means that the website has increased security. You will spot this icon on every major website where users transmit sensitive data, like when you’re logged into your bank account or even your email.
This lock icon indicates that the website is using Hypertext Transfer Protocol Secure (HTTPS) - the secure version of HTTP. Motivus has HTTPS encryption to take extra precaution that your sensitive data is safe. This encrypts your data so that it is secure when being transferred between your web browser and the website you are on.
Most web browsers default settings are designed to be secure when it comes to malware infections. For example, Firefox detects suspicious content and then runs it in a sandboxed low-rights environment. It does this so that if the code happens to compromise security, it won’t have access to full system functionality and resources.
Sandboxing technology is run on all major browsers today, including Chrome and Microsoft Edge. This will secure your computer from infections, however, it won’t necessarily prevent browsers from accessing data which they can later use for advertisement purposes.
If you are concerned about your data being used for advertisement purposes, then we recommend visiting Restore Privacy’s recommendations for the 7 most secure browsers that protect your privacy. At the top of the list you will find browsers like Firefox and Brave, which with certain tweaks to their settings allow for an absolute private browsing experience.
Any questions about Cyber Security in the Motivus Framework? Please use the contact form to reach out.