Remove Applications Remove Authentication Remove Internet Remove Transportation
article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

DIDComm is more than just a way to exchange credentials, it's a protocol layer capable of supporting specialized application protocols for specific workflows. The exchange of DIDs to form a connection with another party gives both parties a relationship that is self-certifying and mutually authenticated. Transport-agnostic.

article thumbnail

The Self-Sovereign Internet

Phil Windley

I spoke on DIDComm and the Self-Sovereign Internet. The foundation of the self-sovereign internet is built on autonomic identifiers. Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Electronic Notebook: A Tool for the Modern Student

Kitaboo

The digital notebook replicates the paper notebook -like displays and some elite ones even come with web browsing and applications. This not only saves trees but also reduces the carbon footprint associated with paper production and transportation. These ensure efficient data exchange during lectures and meetings.

Tools 78
article thumbnail

Ready or not, IoT is transforming your world

Dataconomy

The Internet of Things (IoT), a revolutionary network of interconnected devices and systems, is propelling us into a new era of possibilities. Internet of Things (IoT), has brought about revolutionary changes to the way we live, work, and interact with our surroundings.

article thumbnail

The race is on for quantum-safe cryptography

The Verge

Pretty much all internet security relies on this math to encrypt information or authenticate users in protocols such as Transport Layer Security. In 2019, Google reported that its quantum computer had solved a problem faster than the best existing supercomputers, but it was a contrived task with no practical application.

Internet 131
article thumbnail

Whispering algorithms of smart surroundings

Dataconomy

Characteristics of ambient intelligence AmI manifests itself in various real-world applications, enhancing our daily lives and transforming the way we interact with our environments. Ambient intelligence finds valuable applications in emergency services, which operate in complex and critical environments.

article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

Summary: The self-sovereign internet, a secure overlay on the internet, provides the same capacity to produce change by numerous, unaffiliated and uncoordinated actors as the internet itself. This article explores the properties of the self-sovereign internet and makes the case that they justify its generativity claims.

Internet 135