article thumbnail

The Self-Sovereign Internet

Phil Windley

I spoke on DIDComm and the Self-Sovereign Internet. The foundation of the self-sovereign internet is built on autonomic identifiers. Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier.

article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 Once Bob's agent receives the message, it authenticates that it came from Alice and decrypts it. Transport-agnostic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

2016 Internet of Things (IoT) Predictions

CTOvision

In 2016 there will be a growing number of authentic success stories where the IoT provides real value to consumers and enterprises. Other markets, such as medical, manufacturing, automotive and transportation, have security and safety standards that must be updated to include IoT devices. Hacks will increase in scope and complexity.

Internet 150
article thumbnail

Digital identity startup Evernym sells to Avast, looks to bring trust to a decentralized internet

GeekWire

There’s a lot of chatter these days about Web3 — a decentralized version of the internet that operates outside the confines and grips of social media and technology giants. Evernym describes itself as a leader in “self-sovereign identity.” Earlier this year, identity tech startup Auth0 sold to Okta for $6.5

article thumbnail

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Solutions inspired by nature are being applied to diverse fields including energy production, medicine and healthcare, architecture, food production, transportation and manufacturing. The use cases for a Trusted Security Foundation touch every user of the Internet.

Security 150
article thumbnail

Ransomware Exponentially Increasing as IoT Provides Physical Targeting Opportunities

CTOvision

Ransomware is increasingly targeting multiple industries with downtime and lost productivity as its attack surface expands beyond the virtual realm to the physical via the Internet of Things (IoT), however, organizations can posture against this threat with a comprehensive approach to risk management.

article thumbnail

Pro-Russian LockBit 3.0 Claims Responsibility for Attack on Japan Port

SecureWorld News

Interestingly, the ransomware demand was printed from one of the Nagoya Harbor Transportation Authority's office printers, with LockBit 3.0 This incident serves as a stark reminder of the importance of cybersecurity measures for critical infrastructure, particularly those in the logistics and transport sectors. claiming responsibility.