Uncomplicated IT Logo

FIGHTING HACKERS... WITH LAVA LAMPS?

Megan Poljacik • December 19, 2024

In the headquarters of Cloudfare, a California based tech company, there is a most wonderous wall of mystery. Towering over the entrance, lies wall of around 100 brightly colored lava lamps. While they may be enticing to the eye, these lava lamps actually have a very important job in the security department. Cloudflare provides content delivery network services and DDoS mitigation, and they are known for using lava lamps in their offices as part of its encryption process. The concept is based on a method called "entropy source," which helps generate truly random numbers for encryption keys.


Entropy sources are used in cryptography to generate randomness for various security-related processes, such as encryption key generation and secure communication protocols. Entropy, in this context, refers to the unpredictability and randomness of data, which is crucial for ensuring security and preventing cryptographic attacks.




Developers can improve the strength of their cryptographic systems and minimize the risk of vulnerabilities related to predictable or weak key generation by including a diverse range of entropy sources. In computing, there are two types of entropy sources: hardware and software. Hardware entropy relies on sources such as voltage fluctuations or temperature changes. Software entropy uses sources such as keystrokes or network traffic patterns.


At Cloudflare, a wall of lava lamps are used as part of an array of other entropy sources (such as temperature and voltage fluctuations) to generate unpredictable and random data. A camera across the room picks up the footage of the lamps moving, which is then translated into an algorithm. This data is then utilized in generating cryptographic keys. The smallest change in light or movement will affect the numbers that are used for encryption. Since the wall is located in the building’s lobby, even a person standing in front of it, blocking the camera’s view, will produce changes in the algorithm. By incorporating these physical elements into the process, Cloudflare enhances the security and randomness of its encryption keys, making them more resilient against sophisticated attacks.


Computers are able to create randomness through code but it is inherently not random. In theory if a computer could create it, then a computer could learn the pattern and figure out the encryption key. This is especially true with machine learning and AI being so prevalent today. The movement and changes within the lava lamps produce randomness that is totally unpredictable. This unique approach enables the company to enhance the strength of its encryption mechanisms and bolster the security of its services. Over 10% of the world’s internet traffic flows through Cloudflare’s network so it is critical that they maintain an uncrackable algorithm.


Uncomplicate IT News Blog

By Megan Poljacik March 27, 2025
Three things in life are certain: death, taxes and the persistent threat of cyberattacks. There are many layers of defense in the onion of cyber security, but at the helm is your firewall. Traditionally firewalls have always been the piece of hardware acting as a barrier between your office network and the wilds of the internet. Then in 2020 the way we work was transformed forever by the global pandemic. Nearly a third of the workforce transitioned to remote, leaving offices empty. Many employees continue to work in non-traditional spaces to this day. How can we defend them against cyberattacks if they are outside the protective reach of an on premise firewall? A firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Think of it as a moat with a bridge and a guard shack that surrounds a castle. The guards and the moat are the firewall, acting as a barrier and between a trusted internal network (the castle) and untrusted external networks (random people trying to get in), helping to prevent unauthorized access to and from the castle while allowing legitimate traffic to pass through. The outside forces have to “check in” with the guards before they can cross the moat and access the castle.
By Megan Poljacik February 25, 2025
You may have heard recently that the FBI and Cyber Security and Infrastructure Security Agency are recommending cell phone users use end to end encryption when sending text messages. Why are they doing this and how does it affect you and your business? In December of 2024 authorities revealed that Chinese hackers have breached at least 8 major telecom network infrastructures, including those of Verizon and AT&T. Known as Salt Typhoon, the nefarious actors used a “back door” that is used by U.S. foreign intelligence surveillance systems (yes that’s legal wiretapping). Senior officials within the US Government have admitted the hackers have had access since summer of 2024. It appears that they focused heavily on users in the Washington DC area.
By Megan Poljacik December 19, 2024
Imagine a virus infecting over 85 million Android phones without anyone catching on. Believe it or not, this really happened in 2016! How could a virus be so easily distributed without human intervention? The HummingBad virus was a persistence rootkit, which is a very smart and nasty virus. It is difficult to find and even more difficult to remove. They embed themselves within the system without the users knowledge and they are designed to hide themselves and their activities, even from security software. A rootkit will take over an infected system on its own, or if it cannot gain root access, it will push a fake update prompt, tricking the user into installing. Once the malware has control of the device, it begins downloading and installing apps, and the lucrative business of conning users begins. The HummingBad virus was designed to click on the ads within the apps to generate advertising revenue. This inflated ad click and view counts, allowing the attackers to earn more revenue without actual user engagement. The malware also promoted and installed additional malicious
More Posts
Share by: