TUTK P2P Security Proven in Global Cybersecurity Challenge

Proven Security Strength Validated in an International Cybersecurity Contest

Showcasing its exceptional defensive capabilities, TUTK’s P2P Connection technology ensured ‘zero vulnerability’ defense for a customer’s product during a global hacking contest.
TUTK’s P2P technology employs E2EE to ensure that data remains protected from eavesdropping or tampering during transmission. It also integrates the DTLS protocol, providing multi-layer protection for data integrity and privacy. Moreover, the direct connection architecture reduces reliance on servers, effectively minimizing potential attack surfaces and strengthening overall security.

Continuous Enhancement in Cybersecurity Measures

TUTK considers cybersecurity as the core of its services, strictly controlling every aspect to ensure data is completely secure. Key security measures addressing network connection, transmission, and data integrity include:

  • HTTPS Connection: Utilizes the HTTPS protocol, encrypting SSL/TLS over the HTTP communication layer to ensure the confidentiality and integrity of data during transmission.
  • E2EE: Implements E2EE for devices using UDID to ensure all data remains encrypted throughout the entire transmission process.
  • AES Encryption Keys: Depending on the device, employs AES-128 or AES-256 encryption keys, offering high resistance to brute-force attacks with current technology.
  • Secure Communication Protocols: Selects either TLS or DTLS based on the device for secure communication. These protocols provide essential features such as encryption, integrity verification, and authentication, with their versions regularly planned for upgrades.
  • Packet Scrambling: Supports packet scrambling for specific devices to make the data more resistant to unauthorized cracking and analysis.

Enhancing Security Control Against Global Threats

TUTK will continue to strengthen its cybersecurity mechanisms and strictly adhere to international standards and regulations such as ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, GDPR, and CCPA. This commitment ensures comprehensive security protection across the entire infrastructure, from connection technology to cloud service deployment.