Remove 2005 Remove Authentication Remove Internet Remove Security
article thumbnail

The Self-Sovereign Internet

Phil Windley

I spoke on DIDComm and the Self-Sovereign Internet. If you're not up to speed with DIDComm and how it creates a secure overlay network on TCP/IP, you should be. The foundation of the self-sovereign internet is built on autonomic identifiers. Alice) who, by virtue of knowing the authentication factors (e.g.

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

He originally joined the travel company’s board in 2005. AskJeeves was acquired in 2005 by IAC, the internet media company run by Barry Diller, who is also chairman of Seattle-based Expedia Group. Turner joined CI Security in 2017, originally as an information security analyst.

Groups 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Identity and Consistent User Experience

Phil Windley

The web, and the internet for that matter, never had a consistent user experience for authentication. There's a saying in security: "Don't roll your own crypto." Kim Cameron gave us a model back in 2005 when he introduced Information Cards. That's unfortunate. At least not one that caught on. But how do we do that?

article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

Summary: The self-sovereign internet, a secure overlay on the internet, provides the same capacity to produce change by numerous, unaffiliated and uncoordinated actors as the internet itself. This article explores the properties of the self-sovereign internet and makes the case that they justify its generativity claims.

Internet 135
article thumbnail

DARPA offers $42 million for ‘revolutionary’ research on social media analysis

Trends in the Living Networks

The Defense Advanced Research Projects Agency is soliciting innovative proposals to help build what would be, at its most basic level, an Internet meme tracker. It would be useful to know, for instance, whether signs of widespread rebellion were authentic or whether they were being created by a fringe group with little real support.

Analysis 144
article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. Services then became available that provided secure, auditable IM.

Trends 60
article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. Sure, I trust the state government.

Windows 45