Remove Authentication Remove Banking Remove Open Source Remove Policies
article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

And in May of 2021 Researchers disclosed that the Peloton API authentication was broken. Wilde: Now, for me the storyline was interesting right so when it was reported I think in late January, it was completely open right like this is right no authentication at all because well we didn't tell anybody about it.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

And in May of 2021 Researchers disclosed that the Peloton API authentication was broken. Wilde: Now, for me the storyline was interesting right so when it was reported I think in late January, it was completely open right like this is right no authentication at all because well we didn't tell anybody about it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Authentic Digital Relationships

Phil Windley

Our online relationships with ecommerce companies, social media providers, banks, and others are cold and impersonal, but also relatively efficient. Policies expire. The protocols and code that enable the metasystem are open source and available for review and improvement. Supporting Authentic Relationships.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

That's like any insurance policy if you don't, you're going to have to be able to explain why. And you're going to be explaining why as an organization, your internal capabilities meet or exceed the coverage that you would otherwise be provided as part of the result of a cyber insurance policy. Should you do it or should you not?

article thumbnail

The Sovrin SSI Stack

Phil Windley

Summary: The Sovrin Identity Metasystem is based on a sophisticated stack of protocols, implemented in open-source code, backed and supported by hundreds of organizations, large and small, around the world. These policies are only transitional until the Sovrin Foundation is able to provide Public Write Access.

article thumbnail

The Laws of Identity

Phil Windley

The result is the fractured plethora of identifiers, policies, and user experiences that constitute digital identity in 2019. Consider the following diagram that shows Alice receiving a credential from her employer and proving information about her employment to her bank. their bank's website or their employer's HR system).

Banking 88
article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

Because DIDs are cryptographic artifacts tied to public-private key pairs, this exchange provides the agents with the means to perform mutual authentication and create an encrypted channel. To see how credential exchange works, suppose Alice (the identity owner) is applying for a loan at her local bank (the credential verifier).

Internet 102