Remove tags web of trust
article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

They don't, however, tell them whether they can trust the issuer. That might be all the evidence they need to determine whether to trust the entity. 509 certificates is that there are already many trusted X.509 Summary: The abundance of X.509 At the most recent Internet Identity Workshop , Drummond Reed gave a session on how X.509

Data 69
article thumbnail

Zero Trust with Zero Data

Phil Windley

Summary: The physical world is full of zero trust examples, but they gather attributes for the access control decisions in a very different way than we're used to online. From Zero Trust Referenced 2024-02-09T08:25:55-0500 The real world is full of zero trust examples. This scenario is still zero trust, but not zero data.

Data 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Some Photoshop users can try Adobe’s anti-misinformation system later this year

The Verge

It’s similar to the standard EXIF tags that show the location or date of a photograph, but with cryptographic signatures that let you verify the tags haven’t been changed or falsely applied to a manipulated photo. Adobe wants web users to go “a layer deeper”. Convincing sites to get on board may be the biggest challenge.

Adobe 100
article thumbnail

Vergecast: Microsoft’s metaverse, Beats Fit Pro review, and Craig Federighi on sideloading

The Verge

In segment three, the crew discusses Apple senior vice president Craig Federighi’s speech at Web Summit 2021, where he spoke out against the European Commission’s proposed Digital Markets Act , which, if passed, would allow sideloading on the iPhone. Facebook is shutting down its Face Recognition tagging program.

3D 82
article thumbnail

Smooth Cybercriminals: Google Warns of Iran-Backed APT Hackers

SecureWorld News

One notorious hacking group from Iran uses particularly dirty schemes to fleece users, according to Google's Threat Analysis Group (TAG). According to Google’s TAG blog, APT35 have been active since at least 2017, including attacks on the 2020 U.S. One of APT35’s novel techniques involves using Telegram for operator notifications.

Google 70
article thumbnail

Comparing X.509 Certificates with SSI

Phil Windley

The most common use, by far, is TLS/SSL , the basis for trust in HTTPS, the protocol that secures the Web. For example, when you visit a web site, your browser uses the X.509 509 certificate from the web site to establish a secure connection. Summary: X.509 So, what are the differences between X.509 What's wrong with X.509

Banking 137
article thumbnail

Ingenious Phishing Tactics in the Modern Scammer's Toolbox

SecureWorld News

Evil twin attack To set this trick in motion, a scammer creates a rogue Wi-Fi access point that appears to be a trusted one, using a familiar Service Set Identifier (SSID). When it comes to impactful types of internet-borne crime, phishing is the name of the game. And for good reason. Tactics matter a lot, too.

Google 94