Remove tag cryptography
article thumbnail

Web 2.0 is Collapsing Under its Own Weight

Phil Windley

I think digital wallets (a bad name for an important tool), autonomic (peer) identifiers with strong cryptography, and verifiable credentials are a huge step forward. And part of that is being forced to use their inconvenient and anemic messaging systems. What's the answer? People need tools.

Banking 50
article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

For some people, crypto means cryptography. Cryptography has long been shortened to crypto. Vranken: Yes, some of them are tagged as evidence of Bitcoin databases, basically clones, but also, audits implement an entirely new system. So the one nice thing about cryptography is that it's very, very strictly delineated.

Network 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Announcing the Sovrin Whitepaper

Phil Windley

Most importantly, Sovrin implements Privacy by Design on a global scale, including pairwise pseudonymous identifiers, peer-to-peer private agents, and selective disclosure of personal data using zero-knowledge proof cryptography. Tags: sovrin identity whitepaper verifiable+claims sovrin+token. I hope you'll spend some time reading it.

Internet 103
article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

FIDO is a challenge-response protocol that uses public-key cryptography. Tags: fido identity authentication passkeys She's a security expert and focused many of her remarks on the relative security of different multi-factor authentication (MFA) techniques, a topic I cover in my book as well.

article thumbnail

Comparing X.509 Certificates with SSI

Phil Windley

But DIDs and verifiable credentials represent an innovation that takes learnings from 40 years of experience and new developments in cryptography into account to provide a better, more flexible solution to the problem of exchanging data in a trustworthy way. Tags: ssi identity x.509 The high-level goals of X.509 They should.

Banking 137
article thumbnail

The Self-Sovereign Internet

Phil Windley

Secure overlay networks rely on an identity layer based on asymmetric key cryptography to ensure message integrity, non-repudiation, and confidentiality. Tags: ssi identity didcomm ssiot. An overlay network comprises virtual links that correspond to a path in the underlying network.

article thumbnail

Comparing X.509 Vertificates with SSI

Phil Windley

But DIDs and verifiable credentials represent an innovation that takes learnings from 40 years of experience and new developments in cryptography into account to provide a better, more flexible solution to the problem of exchanging data in a trustworthy way. Tags: ssi identity x.509 The high-level goals of X.509 They should.

Banking 98