article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 When Alice places an X in a square in the game interface, her agent looks up Bob's DID Document. technologies.

article thumbnail

Digital identity startup Evernym sells to Avast, looks to bring trust to a decentralized internet

GeekWire

There’s a lot of chatter these days about Web3 — a decentralized version of the internet that operates outside the confines and grips of social media and technology giants. That pass is a digital credential that allows airlines and governments to verify travel and health documents, including COVID-19 test results.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Engineers in academia, industry and government have designed approaches to address these challenges, including mechanisms like Hardware Security Modules (HSMs) to safeguard and manage security keys for authentication and conduct encryption and decryption. The use cases for a Trusted Security Foundation touch every user of the Internet.

Security 150
article thumbnail

Digital Rights Management: The eBook DRM Revolution

Kitaboo

eBook DRM implements total control over resources using technologies such as encryption and authentication. It includes methods like user authentication, verification, licensing of eBooks, encryption, etc. The internet has facilitated resource access and widened global connections, but it has also given rise to piracy.

eBook 78
article thumbnail

Pandemic Planning - CIO Style

CIO Musings

Make sure you document, document, document so that the next time this comes up you are that much better prepared. Vendors - Better Together Think about the vendors that might help you the most, your suppliers for PCs, internet bandwidth, server equipment, telephony and cloud facilities. make sure they are easy to follow.

Meeting 195
article thumbnail

The High-Stakes Game of Ensuring IoMT Device Security

SecureWorld News

Being constantly connected to the internet, they are either protected by basic passwords or, in some cases, have no password protection at all. Challenges in securing IoMT devices The Internet of Medical Things (IoMT) is essentially a subset of the wider Internet of Things (IoT) concept.

article thumbnail

Over 9,000 Exposed VNCs Threaten Critical Infrastructure

SecureWorld News

New research shows there are more than 9,000 exposed Virtual Network Computing (VNC) servers that are being used without authentication, some of which belong to organizations in critical infrastructure. They say that he could remotely access a ministry employee's desktop without a password or authentication.