Connect with us


Who do the 7 keys of the internet belong to and what are their powers?



Did you know that there is a group of overwhelming people who are able to control the entire internet? It’s not about the Illuminati, but about people who are scattered in different corners of the world who have the “seven keys of the World Wide Web”. Can these buttons turn everything off? Or who knows how to intervene in certain matters just to take them completely off the net? Can you use some of these buttons to shut down and turn on the entire system?

None of them. In fact, the keys actually exist and are shrouded in an aura of “mystery”, but their role is being oversized. Usually people do all this hype to create a sensational tone in stories and videos that are already talking about the subject.

The fact is that since 2010 a group of people has met four times a year to discuss issues relating to the direction of a relevant part of the Internet. These meetings are held alternately: twice on the east coast of the United States and twice on the west side of the country. Everything is organized by the Internet Corporation for Assigned Names and Numbers (ICANN) without outside help from international governments or corporations.

These were the seven experts who took care of the key ceremony 42 (Image: Reproduction /

you Key chain, as key holders are called, are cybersecurity experts who all have many years of experience in digital protection and come from renowned international institutions. They are officially called Trusted Community Representatives because that is exactly what they are.

They were selected because of their differentiated qualifications and their geographical representation. The idea is to balance this balance of power as a country or region cannot have full control over something that is so important to humanity.

What do “internet owners” do?

You already know that there is a group of different people who control some important keys on the internet, but what exactly are they doing? These people work closely with the Domain Name System, or DNS.

DNS server (Domain name system) are responsible for finding and translating the addresses of websites that we enter in browsers into IP numbers. Without this string, you would have to manually enter large character sets or multiple pairs of numbers to access each site (say, the IP address you would enter to enter the site. Kanaltech).

The role of the key holder is to ensure that the domain name system is always secure. Among other things, they meet to compare whether each entry is authentic, which prevents the spread of fake addresses and thus harmful websites. Other operations that may take place during the ceremonies include installing new cryptographic officers, replacing hardware, or generating or replacing a Key Signing Key (KSK).

Key ceremony

At each conference, seven people come together to perform a key DNA analysis. Another seven who are not physically present also access the system to monitor work and check that everything is in order. This meeting is called Key handover ceremony or ceremony of Chaves, in Portuguese.

It works like this:

  1. this 14th Key holder they have a physical key to a safe that has a smart card in it – only the seven who are physically there can enter that location;
  2. This card is the only tool in existence that is able to activate a machine that generates a master key. This key is used to make necessary changes and corrections to the system;
  3. In addition to the card, the computer needs keys to unlock the devices, so they must all be together.

The other seven online-only key owners also play an important role, but they are adapted to the virtual environment. they use Smart cards that contain a snippet of code needed to create a machine that can generate surrogate keys. Once a year the Key holder You use these smart cards to generate the alternate keys: they are saved in case of a future crash that affects the DNS security system.

Whoever wants can follow it Ceremony in virtual mode. It is possible to see the broadcast in real time with all the steps taken, including a little guide to understand what is happening. The newest, called KSK ceremony 42, took place in February 2021.

Once the entire review process is completed, the group will offline band together and capture the moment (usually through photography) to prove the completion of the ceremony. This is your cue to complete the process and wait until the next conference.

The system is only unlocked using the seven smart cards (Image: Playback / Internet Society)

Service centralization

ICANN, based in the United States, is a non-governmental organization responsible for the assignment of the Internet Protocol address space (IPv4 and IPv6), the assignment of protocol identifiers, the administration of the domain name system and the administrative functions of the root server system is.

Despite all these processes, ICANN is still the target of criticism of the centralization of services. That is understandable: it seems to be a great responsibility to put the entire world network in the hands of so few people. Not only do you need to have a reputation that is immune to ethical deviations, but you also run the risk of the key falling into the wrong hands.

The global DNS security keys are updated by this program (Image: Reproduction /

But that’s not how it works. The agency itself says it is virtually impossible to take control given the amount of processes involved. Even if it were feasible, that person would not have access to “the entire Internet” as the work only relates to the data authentication mechanism in DNS, called DNSSEC.

The Myth of the Seven Keys that Control the Internet

These keys are kept in two secure facilities that are 4,000 km apart and are protected with multiple physical layers of security such as guards, cameras, monitored bars and safes. In order to break into such a system, all these protective barriers would have to be broken.

The innermost layer of physical security is a special device called a Hardware security module (HSM) or Hardware Security Module that stores real virtual cryptographic keys and is immune to physical manipulation.

If someone tries to open the device or drop it on the floor, the HSM will delete all keys stored on it to prevent compromise. There are two such devices in every facility and both are in vaults to make access difficult.

HSM only generates the master key when the smart card is inserted (Image: Playback /

Cryptographic keys cannot be used outside of the HSM or individually. The system only works if all those responsible are together with their respective roles. It is like a cog in a complex mechanism: if one stops working, all machines stop.

But what would happen if for some reason the two HSMs got into trouble? Nevertheless, ICANN maintains one Fuse each root key with advanced encryption in a different vault of each security installation.

Even if all four devices broke at the same time, it is still possible to buy a new HSM from the same manufacturer and restore the root keys. In this case, more Trusted Community Representatives will be needed together to complete the transfer. And they will fall back on the backup copy kept by the owners of the Chip card.

Physical keys vs. encrypted digital keys

In both situations shown, the physical keys of these representatives are only used to activate materials that are stored in the security device and do not contain any cryptographic keys of the root zone. On their own and without access to ICANN’s security facilities, keys cannot be used to access the DNS root-protected area.

To do this, all representatives in the security facility and the safe would have to use the chip cards from Fuse it should be open. Unless all multiple layers of physical security have failed, this scenario can only occur during a scheduled key ceremony.

The HSM is kept in this safe, which is protected by bars, cameras and security (Image: Playback / TechTarget)

The other problem with the key story is that the internet is much more than just DNSSEC. The network is made up of many different systems, and DNS is just one of them: control of one aspect does not result in complete control of the others.

So, as much as the activity of Key holder is indeed important and worthy of a film script, the fact is that it is not big enough for a criminal group to take the Internet for themselves and, for example, demand a ransom.

Do you already know this story about the keykeepers? What did you think of her? Leave your impressions in the comments below.

Source: ICANN,, Business Insider, TechTarget

Did you like this article?

Subscribe to Canaltech’s email to receive daily updates on the latest technology news.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


The Galaxy S22 line has released more renders with new looks and dimensions




The Galaxy S22 range has been the focus of several rumors in recent weeks, particularly due to a new look for the Galaxy S22 Ultra and smaller dimensions for the other two models in the series, the Galaxy S22 and the Galaxy S22 Plus. Recently released new images confirm this information through 3D renderings and CAD drawn designs.

Images from the LetsGoDigital portal illustrate how the most expensive smartphone in the line should be. Contrary to previous rumors, the S22 Ultra is not said to have a module that connects all of the rear view cameras, and therefore the lenses must be attached directly to the rear cover. The change should only be aesthetic, because the placement of all cameras, sensors and flash remains the same as with the Galaxy S21 Ultra. The information has been verified through the popular @ UniverseIce profile.

Do you want to catch up on the best tech news of the day? Access and subscribe to our new Canaltech News YouTube channel. Every day a summary of the most important news from the tech world for you!

On the front, the Galaxy S22 Ultra should have a display with a heavily curved aspect on the sides, a feature that was toned down in previous generations of the phone. The selfies camera will remain in a hole in the center of the top of the screen with the speaker near the top.

One of the most important innovations of the S22 Ultra is the implementation of a special compartment for the S Pen stylus in order to attract fans of the Note line, which has not been updated since 2020. FrontTron Twitter profile, the new input is on the bottom of the device, closest to the left corner and near the lower speaker, USB-C input and microphone.

The @ FrontTron release also confirmed the dimensions of all devices on the line, with differences in the size of the three smartphones. The Galaxy S22 will be 145 x 70 x 7 mm (compared to 151 x 71 x 7 mm on the Galaxy S21), while the S22 Plus will be 157 x 75 x 7 mm (compared to 161 x 75 x 7 mm on the Galaxy) has S21 Plus) and the S22 Ultra with 163 x 77 x 9 mm (vs. 165 x 75 x 9 mm for the Galaxy S21 Ultra).

While the change in numbers seems subtle, it could mean relevant changes in the ergonomics of the devices, with a larger footprint and a screen ratio between 19.3: 9 and 19.5: 9 – for comparison purposes, the S21 range has a 20: 9 -Relationship. On the front, the S22 and S22 Plus should stay with symmetrical edges, but they may be significantly thinner.

With the new size, some changes are to be made in the battery aspect. The capacity of the S22 will be reduced from 4,000 mAh to 3,700 mAh, while that of the S22 Plus will be increased from 4,800 mAh to 4,500 mAh – only the S22 Ultra will remain with the same 5,000 mAh energy tank.

There’s no official date for the launch of the Galaxy S22 range yet, but it is possible that it will be released in January 2022, about a year after the S21 range was launched.

Source: Twitter (1,two)

Did you like this article?

Subscribe to Canaltech’s email to receive daily updates on the latest technology news.

Continue Reading


Lenovo confirms Yoga Pro 14s Carbon 2022 with a focus on lightness




The notebook market is very hot as a number of different companies offer their products. Within this industry there are categories such as gamer models or ultra-thin models, which are also quite light, which makes portability easier.

Recently, Lenovo unveiled four new devices with Windows 11 ex-factory, namely the Ideapad Slim 3i, Ideapad Slim 5i, Lenovo Legion 5 Pro and Lenovo Legion Slim 7. Now the brand has confirmed the launch of a new model in the series Yoga, the so-called Yoga Pro 14s Carbon 2022 – which will be a simpler version of the Yoga 16s 2022 – through a post on its official profile on the Chinese social network Weibo.

(Image: Reproduction / Lenovo)

The screenshots show that the Lenovo Yoga 14s Carbon 2022 will have a sleek design with a slimmer case, similar to Apple’s current MacBook Air. So far, the company has only shown one side of the model, as you can see on the teasers, just with a USB Type-C port and an apparent slider to cover the webcam and a button.

Do you want to catch up on the best tech news of the day? Access and subscribe to our new Canaltech News YouTube channel. Every day a summary of the most important news from the tech world for you!

(Image: Reproduction / Lenovo)

Here it is clear that it will have a body made of carbon fiber and an aluminum-magnesium alloy and will therefore weigh only 1.08 kg. Compared to Apple’s ultra-thin notebook, it is 210 grams lighter.

Unfortunately, Lenovo has not yet confirmed when the Yoga Pro 14s Carbon will be released in 2022. But everything indicates that the company will first launch the device in China and then, possibly under a different name, end up in other countries around the world.

Source: Weibo, Notebook check

Did you like this article?

Subscribe to Canaltech’s email to receive daily updates on the latest technology news.

Continue Reading


How to schedule Instagram posts with Canva Pro




The canvas (Android there iOS there network) is an image and video editor that has caught the attention of many Instagram users by offering post templates for the social network. And in the paid version (called Canva Pro) there is an additional trump card: it is possible to schedule posts in the feed.

In order to be able to use the functionality and other exclusive features of the subscription, R $ 34.90 in the monthly plan or R $ 289.90 in the annual plan must be paid. Fortunately, the image editor offers a 14-day free trial. The user must also have a work or business Instagram account linked to a Facebook Page.

If you do not know where to start, check out how to change the account type on the social network and connect to a page on the neighboring platform. Only after completing these steps will it be possible to schedule publications through Canva Pro. Learn how to do the process below!

Do you want to catch up on the best tech news of the day? Access and subscribe to our new Canaltech News YouTube channel. Every day a summary of the most important news from the tech world for you!

How to schedule Instagram posts with Canva Pro

Step 1: Go to Canva and open the Editor menu. To do this, click the three-line button in the lower right corner.

Access the app menu. (Image: Kris Gaiato / Screenshot)

Step 2: Then select the “Content Planner” tab.

Open the content scheduler options. (Image: Kris Gaiato / Screenshot)

Step 3: On the next screen, select the date of publication. Then decide whether to use a saved file or create a new design.

Select a date and creation. (Image: Kris Gaiato / Screenshot)

Step 4: Then select the three-dot button to set a time and then click “Select Channel”.

Define a time and a channel for the publication. (Image: Kris Gaiato / Screenshot)

Step 5: With Canva Pro it is possible to schedule publications on various social networks such as Twitter, Pinterest, LinkedIn and even on Weibo, a Chinese platform. To schedule posts on Instagram, select the Instagram for Business option.

Select one of the available social networks. (Image: Kris Gaiato / Screenshot)

Step 6: Now click on “Connect via Facebook” and enter your login details to log in.

Proceed to connect through Facebook. (Image: Kris Gaiato / Screenshot)

Step 8: Select the Instagram account you want to link to Canva.

Select an Instagram account. (Image: Kris Gaiato / Screenshot)

Step 9: Then select a Facebook page.

Select a Facebook page. (Image: Kris Gaiato / Screenshot)

Step 10: To complete this step, adjust the editor’s permissions and tap “Finish”.

Edit Canva Pro permissions (Image: Kris Gaiato / Screenshot)

Step 11: Then select the Instagram account that the picture will be posted to.

Select the account. (Image: Kris Gaiato / Screenshot)

Step 12: Finally, create a caption and tap on “Schedule Post”.

Create a caption and complete the schedule. (Image: Kris Gaiato / Screenshot)

Ready! Now you know how to use Canva Pro to schedule posts on Instagram.

Did you like this article?

Subscribe to Canaltech’s email to receive daily updates on the latest technology news.

Continue Reading