John McAfee proposes anti-surveillance 'D-Central' router to beat the NSA

Launches Future Tense startup

Antivirus pioneer and onetime fugitive from the Belize police John McAfee has floated plans to beat NSA surveillance by launching a new type of personal peer-to-peer networking device called D-Central.

Using last week's C2SV arts and tech conference as his platform, the 68 year-old entrepreneur was by turns direct and vague about the proposed device, which he plans to sell through a new startup, Future Tense.

Judging from his comments on YouTube, D-Central (as in 'decentralised') will be a pocket-sized personal router that owners will use to create small encrypted wireless networks stretching a few blocks in range.

Not automatiically connected to the Internet (hence the anti-surveillance tag), D-Central will be a building block for island networks that can connect to one another without the need to risk eavesdropping via Internet service providers. Users on each router will be able to communicate with one another in either public or private, anonymous modes.

"I've been thinking about this product for years," announced McAfee during a question and answer session. "The NSA helped create every single encryption algorithm we use and therefore can get access to whatever they want We live in a very insecure world with a very insecure communications platform," explained McAfee.

"[With D-Central] everyone's network is unique to themselves. It doesn't ask who you are, it doesn't even know who you are. There is no unique identifier for your device that is constant, every few minutes it changes."

To allow for Internet communications, the system will appoint nodes to connect to it, creating an encrypted tunnel between nodes in other cities, McAfee explained. Users connecting to the device would need an app on their smartphone or computer.

Currently, the device had been designed and Future Tense was looking for partners to build the hardware, he added.

"I can't imagine any college student in the world not standing in line to buy one of these."

A lot of people - one might venture to say the majority of tech-watchers - opine that McAfee has 'lost it'. It's just that precisely what he's lost or where it's gone is not always clear.

But D-Central is undoubtedly the sort of device that might have found its moment in the post-Snowden era where surveillance, long suspected, can now be assumed. There are some technical wrinkles that lie unexplained.

If users connect using a client, how secure can that be on an accessible platform, be that mobile (Android or iPhone) or a PC? What is the system for anonymising and connecting clients within the device's range given that the router and client will need to set up and maintain a connection? Could the D-Central itself be hacked?

Might it be used for nefarious purposes, McAfee was asked. "Of course it can be used for nefarious purposes just like the telephone can be used for nefarious purposes," he shot back.

McAfee could be the high-profile figure to get an interesting idea of the ground but he still has a lot of distractions vying for his attention. The entrepreneur escaped a Belize police raid last November after one of his neighbours was murdered, since his life and the sometimes bizarre events spinning around it have seemed as clear as mud.

Tags: Personal Tech, Mobile &amp, mcafee, security, Networking, wireless, nsa, youtube

Microsoft confirms HTTP Strict Transport Security for IE 12

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Webroot SecureAnywhere Business

The lightest, fastest, easiest-to-manage, and most effective endpoint protection.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.