Remove Authentication Remove Internet Remove Social Remove Transportation
article thumbnail

The Self-Sovereign Internet

Phil Windley

I spoke on DIDComm and the Self-Sovereign Internet. The foundation of the self-sovereign internet is built on autonomic identifiers. Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier.

article thumbnail

Digital identity startup Evernym sells to Avast, looks to bring trust to a decentralized internet

GeekWire

There’s a lot of chatter these days about Web3 — a decentralized version of the internet that operates outside the confines and grips of social media and technology giants. Evernym describes itself as a leader in “self-sovereign identity.” Earlier this year, identity tech startup Auth0 sold to Okta for $6.5

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

Try not to use free public hotspots or charge devices at public transport stops or other public places. Turn off the internet connection if you will not be using it for an extended period. Staying safe on social networks Prioritize safe communication habits on social media platforms. Fully utilize firewall capabilities.

Network 84
article thumbnail

What is Privacy?

Phil Windley

Absolute digital privacy can be achieved by simply never using the Internet. Even a simple Internet Control Message Protocol (ICMP) echo request packet is a conversation as we're defining it—the message needn't be meaningful to humans. This example introduces another important term to this discussion: authenticity.

article thumbnail

Bringing the National Museum of African American History and Culture to the world

CIO Business Intelligence

A good deal of the traffic has been driven by a QR code deployed across social media channels and other communications outlets to promote awareness of the digital museum’s existence. But thanks to an inventive digital offering, called Searchable Museum , the museum has been able to reach even more.

3D 98
article thumbnail

The Architecture of Identity Systems

Phil Windley

Locke argued that "sovereign and independent" was man’s natural state and that we gave up freedom, our sovereignty, in exchange for something else, protection, sociality, and commerce, among others. I argued that the architecture of SSI, its structure, made those relationships more authentic. More succinctly we ask: who controls what?

article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates for client to.

Sean Daniel

In this post I talked primarily about how the server is authenticated to the client by using a “root” certificate that the client already trusts, thus establishing a trust relationship with a website you are at without actually having been there before. Understanding SSL Certificates for client to server encryption.

Windows 45