article thumbnail

Internet Identity Workshop 37 Report

Phil Windley

We recently completed the 37th Internet Identity Workshop. In closing circle someone said (paraphrashing) that authentication is solved and the next frontier is authorization. Summary: The latest IIW was great with many high intensity discussions of identity by people from across the globe. The topics were diverse. I tend to agree.

article thumbnail

University of Michigan Cyber Incident Causes Internet Outage

SecureWorld News

The University of Michigan experienced an internet outage on August 27th that affected students, faculty, and staff across all three campuses just as the fall semester was kicking off. Students and faculty were also unable to connect to the internet on their personal devices. The outage began at approximately 1:40 p.m.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What will stop AI from flooding the internet with fake images?

Vox

Reporters asked government officials all the way up to the White House press office what was going on. Online misinformation has existed since the dawn of the internet, and crudely photoshopped images fooled people long before generative AI became mainstream. On May 22, a fake photo of an explosion at the Pentagon caused chaos online.

Internet 102
article thumbnail

This messaging app uploads every file you send to the internet, which is bad

The Verge

Here’s what’s going on: Go SMS Pro uploads every media file you send to the internet and makes those files accessible with a URL, according to a report by Trustwave. There’s no authentication required to look at the link, meaning that anyone who has it could view the content within. The URL is where the trouble is.

Internet 141
article thumbnail

Passwords Belong In Time Capsules, Not IT Ecosystems

Forrester IT

According to the FBI’s 2019 Internet Crime Report, phishing was the most widely reported cybercrime last year. It’s no secret that credential theft remains a primary attack vector for cybercriminals. The bitter truth is that legacy […].

Internet 442
article thumbnail

Authentic Digital Relationships

Phil Windley

I argue that this is the kind of thing the internet is best at. Supporting Authentic Relationships. Fortunately, no one was hurt, but the highway patrol has come to the scene to make an accident report. In that sense, the web has kept it's promise. In this scenario, two drivers, Alice and Bob, have had an accident.

article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 Once Bob's agent receives the message, it authenticates that it came from Alice and decrypts it. technologies.