Remove Authentication Remove Banking Remove Open Source Remove Transportation
article thumbnail

Digital identity startup Evernym sells to Avast, looks to bring trust to a decentralized internet

GeekWire

” The 30-person company has worked to create decentralized identifiers for open-source projects and efforts such as International Air Transport Association’s Travel Pass. Evernym describes itself as a leader in “self-sovereign identity.” Earlier this year, identity tech startup Auth0 sold to Okta for $6.5

article thumbnail

The Laws of Identity

Phil Windley

It implies we need a simple encapsulating protocol (a way of agreeing on and transporting things). Consider the following diagram that shows Alice receiving a credential from her employer and proving information about her employment to her bank. Alice has exchanged private DIDs with both her employer and the bank.

Banking 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

A kind of digital smash and grab of sensitive information such as the encryption keys created to protect sensitive transactions on a site like Amazon, or your bank with no way to trace any of it back to you. I mean, it was open source, right? What I want to know is how that vulnerability was able to persist for so long.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

A kind of digital smash and grab of sensitive information such as the encryption keys created to protect sensitive transactions on a site like Amazon, or your bank with no way to trace any of it back to you. I mean, it was open source, right? What I want to know is how that vulnerability was able to persist for so long.

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

It implies we need a simple encapsulating protocol (a way of agreeing on and transporting things). Because DIDs are cryptographic artifacts tied to public-private key pairs, this exchange provides the agents with the means to perform mutual authentication and create an encrypted channel.

Internet 102
article thumbnail

Generative Identity

Phil Windley

She might also use it at partner websites (like the benefits provider) to provide shared authentication without federation (and it's associated infrastructure). For example, suppose she is applying for a loan and her bank, Certiphi, who wants proof that she's employed and has a certain salary. Certificate of authenticity (e.g.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

A kind of digital smash and grab of sensitive information such as the encryption keys created to protect sensitive transactions on a site like Amazon, or your bank with no way to trace any of it back to you. I mean, it was open source, right? What I want to know is how that vulnerability was able to persist for so long.