Georgia Tech researchers are working on a way to profile devices along the supply chain to identify whether they’ve been compromised. An application called CloudCapsule encrypts data on mobile and other devices before information is securely transmitted and stored in the cloud. An individual can determine if the systems’ architecture is compromised and a device on the system is not what it purports to be. Researchers are continuing work on a method for enabling a search of encrypted data stored on the cloud; and ensuring that any newly developed security solutions can be easily applied.”]
Source: https://www.cuinfosecurity.com/supply-chain-finding-bad-devices-a-6344

