Remove 2005 Remove Architecture Remove Authentication Remove Open Source
article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

In 2005, Jonathan Zitrain wrote a compelling and prescient tribute to the generative capacity of the Internet and its tens of millions of attached PCs. Figure 2: Binding of controller, authentication factors, and identifiers in identity systems. Multiple vendors, and even open-source tools can easily use DIDComm.

Internet 135
article thumbnail

Geek of the Week: Tech vet Dick Hardt searches for a better way to verify your ?internet identity?

GeekWire

Dick Hardt has often been “early to the new,” as he puts it: Microsoft Windows in 1986, neural networks in 1989, the internet in 1993, open source in 1995, and even Burning Man in 1999. But a technical architecture that ensures the central system can be trusted is more likely to gain acceptance. back in 2005.

Internet 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

It was for UNIX systems and it was created by Dan Farmer and Wheat-say Vene-ma, who then co-authored a book in 2005 called Forensic Discovery. To be good at digital forensics, to be a digital Sherlock Holmes, you need to understand systems architecture. Also multi factor authentication, that is a must.

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

In 2005, Kim Cameron, Microsoft’s Chief Identity Architect, published the Laws of Identity (PDF), a paper that laid out seven important principles for how digital identity should work. But they constrain architectural choices to ensure that the universal identity metasystem is not just usable, but also safe and secure.

Internet 102