Once hailed as unhackable, blockchains are now getting hacked. Security testing has become imperative for cryptocurrency and smart contract platforms as hackers have become equipped to exploit numerous flaws in blockchains.
Real estate plays a significant role in the Indian Government’s stated goal of transforming India into a $5 trillion economy and blockchain can play a major role in realising this goal.
Cloud Identity: A Recipe for Higher EducationMike Schwartz
The concept of cloud identity in higher education was recognized in November 2009 with the EDUCAUSE Catalyst Award, which honors IT-based innovations that provide groundbreaking solutions to major challenges in higher education.
But what is cloud identity?
The gist is that cloud identity enables a person's "user" information to be distributed on the Internet. This solves a common problem: the need to maintain a username at every website. In this paradigm shift, identity information is not stored within each website, but accessed on the wire as needed. Websites become "relying parties" (RPs) using the information of trusted "identity providers" (IdPs). Although it has taken a while, finally the recipe for federated identity seems clear.
This is a 50 minutes introduction about Ctyprocurrency (e.g. Bitcoin, Ethereum, ...) & Blockchain technology. In this session we will learn
What is Cryptocurrency & Why?
How to use Cryptocurrency like bitcoin and etherum ?
The technical background about Cryptocurrency.
What is the blockchain? How is it used as cryptocurrency platform.
Blockchain features and applications.
Youtube Video by the end of presentation.
https://youtu.be/tovCpsuyjoQ
Link
https://wp.me/p8BMmp-mv
“What is Blockchain Technology?” – this is the question that more and more people ask nowadays. Learn more about blockchain:
http://pragmaticcoders.com/blog/what-is-blockchain/
Once hailed as unhackable, blockchains are now getting hacked. Security testing has become imperative for cryptocurrency and smart contract platforms as hackers have become equipped to exploit numerous flaws in blockchains.
Real estate plays a significant role in the Indian Government’s stated goal of transforming India into a $5 trillion economy and blockchain can play a major role in realising this goal.
Cloud Identity: A Recipe for Higher EducationMike Schwartz
The concept of cloud identity in higher education was recognized in November 2009 with the EDUCAUSE Catalyst Award, which honors IT-based innovations that provide groundbreaking solutions to major challenges in higher education.
But what is cloud identity?
The gist is that cloud identity enables a person's "user" information to be distributed on the Internet. This solves a common problem: the need to maintain a username at every website. In this paradigm shift, identity information is not stored within each website, but accessed on the wire as needed. Websites become "relying parties" (RPs) using the information of trusted "identity providers" (IdPs). Although it has taken a while, finally the recipe for federated identity seems clear.
This is a 50 minutes introduction about Ctyprocurrency (e.g. Bitcoin, Ethereum, ...) & Blockchain technology. In this session we will learn
What is Cryptocurrency & Why?
How to use Cryptocurrency like bitcoin and etherum ?
The technical background about Cryptocurrency.
What is the blockchain? How is it used as cryptocurrency platform.
Blockchain features and applications.
Youtube Video by the end of presentation.
https://youtu.be/tovCpsuyjoQ
Link
https://wp.me/p8BMmp-mv
“What is Blockchain Technology?” – this is the question that more and more people ask nowadays. Learn more about blockchain:
http://pragmaticcoders.com/blog/what-is-blockchain/
Role of blockchain technology in critical infrastructure securityGlobal Tech Council
Blockchain is a distributed ledger system that was once referred to as Bitcoin's underlying exchange technology, but has now widened its field and emerged as a mainstream technology that embraces other innovations such as artificial intelligence, machine learning, data science, big data, and more.
The entire Blockchain certification program is divided into different modules, which will let you explore Blockchain technology and its use cases in cybersecurity.
General explanation of blockchain held during the dialogue forum event of den (Deutsche Energieagentur) in Berlin on the 1st of March 207.
Are you interested in further information on blokchain use cases?
Check: http://bolten-consulting.com/use-cases/?lang=en
Cybersecurity aspects of blockchain and cryptocurrencyTony Martin-Vegue
Slides from Tony Martin-Vegue's presentation at PRMIA 2018 Risk Management and Regulatory Compliance Round Table in San Francisco, CA | April 11, 2018
"Cybersecurity Aspects of Blockchain and Cryptocurrency"
Abstract:
Many companies are considering blockchain technologies to make transactions faster, more secure and cost effective. If you are performing risk analysis on these emerging technologies, you ask be asking yourself: how do I even start to analyze risk when there are so many unknowns? A successful analysis requires a paradigm shift in thinking into two areas: casting aside the defense-in-depth metaphor to describe security controls; and, how we assess and analyze risk of new and emerging technologies that have a high degree of uncertainty.
This talk will cover how to reframe your assessments for emerging technologies, such as blockchain, and how risk quantification methodologies such as Factor Analysis of Information Risk (FAIR) can help answer some of these questions and produce a credible risk assessment.
HashiCorp 2019: "Secure Routing and Traffic Management with Ambassador and Co...Daniel Bryant
Ambassador is a Kubernetes-native API gateway that serves as a common point of ingress to applications and services that are running both inside and outside of Kubernetes, and provides common cross-cutting functionality such as user authentication, API management, and TLS termination. Consul service mesh provides the source of truth for the entire datacenter, tracking available services, keeping runtime configurations, and enforcing secure end-to-end communication via mTLS encryption. In this architecture, Ambassador leverages Consul’s service discovery to provide routing to service and obtains the appropriate TLS certificate from Consul to originate encrypted TLS connection to the end service.
BlockChains are a logical next step beyond centralised and distributed (networked) ledgers used to record all forms of transaction, files and documentation for legal, medical, industrial, government and defence entities. The biggest change is the lack of any middle man and/or institutions. With open and available to anyone, individuals and groups as well as companies can build open, closed, public or private BlockChains.
The technology constitutes a step function in security, privacy, reliability and utility. Although it is the basis of BitCoin and other currencies, it is not limited to financial transactions and can be applied to all forms of asset movement, agreements, documents, files, voting and more across all sectors.
The base concepts are founded on networking and distributed adjudication processes that generally embrace Digital Signatures, Public and Private Key, Encryption, and Hash Checks.
170321 cebit blockchain summit frank boltenFrank Bolten
Blockchain technology, Ethereum as Blockhain2.0, Smart Contracts, public vs enterprise blockchain, use case for government, enterprises, IoT, SCM etc
>> 200 blockchain based projects on http://bolten-consulting.com/blockchain/?lang=en
How the hospitality industry take the benefits of blockchain technology Blockchain Council
The hospitality industry is also only witnessing a paradigm change, and it is now becoming more technology-oriented. So, how will Blockchain help in reshaping this industry and what benefits will the hospitality industry derive from it.
Short presentation on why a new paradigm is needed for applications & online services offered on the Internet. The Web3 vision relies on the Blockchain technology and the principle of decentralization as cornerstones, to enforce data privacy & require user consent.
Blockchain is a database where information can save that can be any kind, and it is an immutable ledger where recording transactions and tracks assets in a business network.
Blockchain is essential in business because businesses run from information the faster you receive and the more accurate it is better for business. Business is mostly adopting blockchain technology because the information is secure and accurate data is available in the blockchain.
Digital Identity talk from Strange Loop 2018 and Build Stuff Lithuania 2018 including walkthrough of the uPass system and the design principles behind it.
An overview of the uPass digital identity system. Covers the core problem domain and the end-to-end stack from liveness to black-box transaction store. Lots of diagrams, references to all the relevant patent applications and so forth.
Role of blockchain technology in critical infrastructure securityGlobal Tech Council
Blockchain is a distributed ledger system that was once referred to as Bitcoin's underlying exchange technology, but has now widened its field and emerged as a mainstream technology that embraces other innovations such as artificial intelligence, machine learning, data science, big data, and more.
The entire Blockchain certification program is divided into different modules, which will let you explore Blockchain technology and its use cases in cybersecurity.
General explanation of blockchain held during the dialogue forum event of den (Deutsche Energieagentur) in Berlin on the 1st of March 207.
Are you interested in further information on blokchain use cases?
Check: http://bolten-consulting.com/use-cases/?lang=en
Cybersecurity aspects of blockchain and cryptocurrencyTony Martin-Vegue
Slides from Tony Martin-Vegue's presentation at PRMIA 2018 Risk Management and Regulatory Compliance Round Table in San Francisco, CA | April 11, 2018
"Cybersecurity Aspects of Blockchain and Cryptocurrency"
Abstract:
Many companies are considering blockchain technologies to make transactions faster, more secure and cost effective. If you are performing risk analysis on these emerging technologies, you ask be asking yourself: how do I even start to analyze risk when there are so many unknowns? A successful analysis requires a paradigm shift in thinking into two areas: casting aside the defense-in-depth metaphor to describe security controls; and, how we assess and analyze risk of new and emerging technologies that have a high degree of uncertainty.
This talk will cover how to reframe your assessments for emerging technologies, such as blockchain, and how risk quantification methodologies such as Factor Analysis of Information Risk (FAIR) can help answer some of these questions and produce a credible risk assessment.
HashiCorp 2019: "Secure Routing and Traffic Management with Ambassador and Co...Daniel Bryant
Ambassador is a Kubernetes-native API gateway that serves as a common point of ingress to applications and services that are running both inside and outside of Kubernetes, and provides common cross-cutting functionality such as user authentication, API management, and TLS termination. Consul service mesh provides the source of truth for the entire datacenter, tracking available services, keeping runtime configurations, and enforcing secure end-to-end communication via mTLS encryption. In this architecture, Ambassador leverages Consul’s service discovery to provide routing to service and obtains the appropriate TLS certificate from Consul to originate encrypted TLS connection to the end service.
BlockChains are a logical next step beyond centralised and distributed (networked) ledgers used to record all forms of transaction, files and documentation for legal, medical, industrial, government and defence entities. The biggest change is the lack of any middle man and/or institutions. With open and available to anyone, individuals and groups as well as companies can build open, closed, public or private BlockChains.
The technology constitutes a step function in security, privacy, reliability and utility. Although it is the basis of BitCoin and other currencies, it is not limited to financial transactions and can be applied to all forms of asset movement, agreements, documents, files, voting and more across all sectors.
The base concepts are founded on networking and distributed adjudication processes that generally embrace Digital Signatures, Public and Private Key, Encryption, and Hash Checks.
170321 cebit blockchain summit frank boltenFrank Bolten
Blockchain technology, Ethereum as Blockhain2.0, Smart Contracts, public vs enterprise blockchain, use case for government, enterprises, IoT, SCM etc
>> 200 blockchain based projects on http://bolten-consulting.com/blockchain/?lang=en
How the hospitality industry take the benefits of blockchain technology Blockchain Council
The hospitality industry is also only witnessing a paradigm change, and it is now becoming more technology-oriented. So, how will Blockchain help in reshaping this industry and what benefits will the hospitality industry derive from it.
Short presentation on why a new paradigm is needed for applications & online services offered on the Internet. The Web3 vision relies on the Blockchain technology and the principle of decentralization as cornerstones, to enforce data privacy & require user consent.
Blockchain is a database where information can save that can be any kind, and it is an immutable ledger where recording transactions and tracks assets in a business network.
Blockchain is essential in business because businesses run from information the faster you receive and the more accurate it is better for business. Business is mostly adopting blockchain technology because the information is secure and accurate data is available in the blockchain.
Digital Identity talk from Strange Loop 2018 and Build Stuff Lithuania 2018 including walkthrough of the uPass system and the design principles behind it.
An overview of the uPass digital identity system. Covers the core problem domain and the end-to-end stack from liveness to black-box transaction store. Lots of diagrams, references to all the relevant patent applications and so forth.
Don't Ask, Don't Tell - The Virtues of Privacy By DesignEleanor McHugh
This is a fairly technical overview of the considerations involved in architecting software systems to support privacy. Rather than focus on what the law demands - something which can change across time and jurisdictions - it looks at the real problems we need to solve to know as little about the users of computer systems as possible whilst achieving their needs.
Block chains and crypto currencies - introductionInitio
Objectives and knowledge sharing
• What is blockchain? Why should we care?
• Cryptography: Shared secrets and the Blockchain
• Protocols: What’s in those blocks ?!
• Ethereum
• Bitcoin
• Hyperledger
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
The ForgeRock Identity Platform and Edge security solution can turn any IoT device into a secure, trusted active subject enrolled and on-boarded from a hardware based root of trust to become an autonomous entity in your business relationship eco system represented by a digital twin.
Identity Live London 2017 | Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
By Steve Ferris SVP Global Customer Success, ForgeRock, Alain Barbier Principal Customer Engineer, ForgeRock, Leonard Moustacchis Senior Customer Engineer, ForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
EthCC 2018 - Decentralized Digital Identity on EthereumFabrice Croiseaux
ETHEREUM AS THE NEW PLATFORM FOR DIGITAL IDENTITY TRUST SERVICES
Blockchain is the ideal platform to manage identities, authentication and signatures. It combines the strong security and chain of trust currently provided by PKI with the ease of use and interoperability provided by social network identities.
Future generation of wallets will give a secure and easily manageable access to public blockchains to everybody.
Being the most widely deployed multi purposed public blockchain, Ethereum is the ideal candidate to host strong identities. Moreover, some identity standards (ERC725, ERC735) are arising.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...PECB
While Blockchain technology creates strong cryptographic controls securing the integrity of data, successful, cooperative Blockchain networks must establish trust between a varieties of independent entities to create overall trust. In this presentation, Scott Perry and Drummond Reed will discuss how trust is created in Blockchain systems and the varying layers (i.e. ledger, agent, credential exchange and governance) that add trust within interoperable parties and reliance to external Blockchain’s within the web of trust. As active members of the Sovrin Governance Working Group, including the first robust trust assurance model for Blockchain’s, our presenters will discuss how all Blockchain’s networks can add accountability within stakeholder roles to ensure that Blockchain’s are trustworthy above the embedded cryptographic trust assertions.
The target of this webinar is leaders and participants in the industry who are seeking greater acceptance and assurance in the trustworthiness of their network.
This session will help you learn which role systems auditors, cybersecurity professionals, and risk management experts will have to play to ensure trust must be built and maintained when adopting such cutting-edge technologies.
The webinar covers:
• How Digital Trust is created
• How Blockchain’s novel attributes contribute to digital trust
• Blockchain’s beneficial use cases
• Deeper Dive into Self Sovereign Identity as a unique Blockchain use case
Date: March 18, 2019
Recorded Webinar: https://youtu.be/1lcuf9bJFBQ
The first cut of a talk on the R&D process in software development, including taking an invention to patent.
Includes two sets of code examples. One is Forth implemented in a 1980s dialect of Basic.
The other introduces evolutionary prototyping using a hybrid ruby/bash methodology.
Generics, Reflection, and Efficient CollectionsEleanor McHugh
This is a talk about how we structure and collate information so as to effectively process it, the language tools Go provides to help us do this, and the sometimes frustrating tradeoffs we must make when marry the real world with the digital.
We'll start by looking at basic collection types in Go: array, slice, map, and channel. These will then be used as the basis for our own user defined types with methods for processing the collected items.
These methods will then be expanded to take functions as parameters (the higher order functional style popularised by languages such as Ruby) and by using Go's Reflection package we will generalise them for a variety of tasks and uses cases.
Reflection adds an interpreted element to our programs with a resulting performance cost. Careful design can often minimise this cost and it may well amortise to zero on a sufficiently large collection however there is always greater code complexity to manage. When the data to be contained in a user defined collection is homogenous we can reduce much of this complexity by using Generics and our next set of examples will demonstrate this.
At the end of this talk you should have some useful ideas for designing your own collection types in Go as well as a reasonable base from which to explore Reflection, Generics, and the Higher-Order Functional style of programming.
Go for the paranoid network programmer, 3rd editionEleanor McHugh
Draft third edition of my #golang network programming and cryptography talk given to the Belfast Gophers Meetup. Now with an introduction to websockets.
An introduction to functional programming with goEleanor McHugh
A crash course in functional programming concepts using Go. Heavy on code, light on theory.
You can find the examples at https://github.com/feyeleanor/intro_to_fp_in_go
Implementing virtual machines in go & c 2018 reduxEleanor McHugh
An updated version of my talk on virtual machine cores comparing techniques in C and Go for implementing dispatch loops, stacks & hash maps.
Lots of tested and debugged code is provided as well as references to some useful/interesting books.
Don't ask, don't tell the virtues of privacy by designEleanor McHugh
A very light intro talk on privacy, identity, and designing with the latter to preserve the former.
Probably makes no sense at all without the audio so if it whet's your appetite dig through my other decks on these topics. Most of those have code in for the more technically minded.
An introduction to Go from basics to web through the lens of "Hello World", extracted from the Book "A Go Developer's Notebook" available from http://leanpub.com/GoNotebook
Finding a useful outlet for my many Adventures in goEleanor McHugh
A talk about my Leanpub-published living eBook: A Go Developer's Notebook. Buy my book? Write your own Book using Leanpub? Learn you some Golang for fun?
Implementing Software Machines in C and GoEleanor McHugh
The next iteration of the talk I gave at Progscon, this introduces examples of Map implementation (useful for caches etc.) and outlines for addition of processor core code in a later talk.
Implementing Software Machines in Go and CEleanor McHugh
Early draft of a tutorial on techniques for implementing virtual machines and language interpreters. Contains example programs for functional stacks and despatch loops.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
3. DIGITAL IDENTITY - THE GRAIL QUEST
➤ can we create a global identity system that:
➤ nobody owns
➤ cannot be subverted
➤ works on desktop, mobile & IoT
➤ embraces anonymity rather than pseudonymity
➤ anchors to real-world identity documents
➤ embraces UK common law
➤ scales to global needs
➤ transacts in < 500ms
5. COMMON LAW CONTRACTS & TRANSACTIONS
➤ at least one party makes an offer
➤ all parties must then reach mutual assent
➤ and have an intention to create legal relations
➤ an exchange of sufficient consideration must then occur
➤ identification of the parties is implicit
➤ and my be put to the test in court
8. A NAIVE APPROACH TO SHARING IDENTITY
➤ conventional client-server architecture
➤ A must trust B and B must trust Server
➤ each link involves a request-response over HTTPS links
➤ this is noisy and each link is an attack point for flow analysis
9. REDUCING IDENTITY TO A CLEAN TRANSACTION
➤ unidirectional data-flow architecture
➤ B doesn't contact Server, and V doesn't contact B
➤ Server contacts both B and V
➤ each link is less susceptible to flow analysis
10. IMMUTABLE PROFILES
➤ PKI certificate information - too heavy
➤ Attributes – too many, changeable
➤ SSO – not enough information
➤ we need a Goldilocks solution…
➤ fixed collections of one or more attributes
➤ change attributes by creating new profiles
➤ each profile links to its antecedent
➤ use cryptography to secure the version chain
11. MANAGING A PERSON'S IDENTITIES
➤ anchor documents
➤ passport, driving licence, identity card, ...
➤ biometric stream
➤ successions of biometric captures for the person
➤ profile set
➤ a choice of user profiles
➤ credentials
➤ large ephemeral random identifiers
➤ assigned to the [user | device | profile]
18. PATENTS
➤ US2016239658 Digital Identity
➤ US2016239653 Digital Identity
➤ US2016241532 Authentication of Web Content
➤ US2016241531 ConfidenceValues
➤ US2016239657 Digital Identity System