SlideShare a Scribd company logo
Today, identity provider saml is always in the context of a DNS domain name.
Registering your own domain is the only chance you have at privacy. However, domain
name registration itself is privacy destroying.
After seeing a recent bit Coin info graphic, it made me think of an old blog I wrote a
few years back about an idea for an Internet naming system based on bit Coin. DNS is
surely one of the great achievements of standards based inter-operability. The mere
mention of a naming system other than DNS is verboden in Silicon Valley. But why do
we need these silly “dotted” hierarchical naming systems. Why can’t I just be “mike”?
Conventional wisdom is that a contextual naming system is needed for Internet scale.
In a flat namespace, the “good” names will be immediately unavailable, and the rest of
us will have to get some lame alternative that might as well be a DNS component. How
many good Twitter IDs are going to be left after 100 years?
It always seemed that being a TLD registrar was just too sweet of a deal. Its a natural
monopoly. Sure with standard registries, we have some competition… but we’ve accepted
that we have not only have to pay these marginally valuable middle men, but we waste
lots of time getting things right, and then get lots of spammy offers we don’t care about.
But if that’s not bad enough, how sweet it is to be the governor of the registries. One can
only imagine the fringe benefits for board members of ICANN. And the announcement a
while back that ICANN would auction new TLDs at market prices provides a new revenue
stream for these technical pontiffs. Monash University is the first branded TLD. ICANN
accruing the benefit of naming the Internet is the best we can do?
When the architects of the Internet designed DNS, there was no distributed transaction
technology like bit Coin. DNS was a fabulous solution. But now that we have a more
efficient alternative, we should use it.
My idea is that an “xCoin” would represent a globally resolvable identifier. X marks the
spot. Like a dollar bill, the coin has a serial number. Unlike a dollar bill, it also has other
attributes or “claims.” The xCoin rules can allow for these claims or the coins themselves
to be transferred.
There is some precedent for using bit Coin for DNS: name Coin. Name coin allows
you to: (1) Securely register and transfer arbitrary names (keys); (2) Attach 1K of data
to each name; (3) Trade and transact in Name coins. All of this is done
pseudonymously (data is linked to a randomly generated addresses) and in a
decentralized manner which is strongly resistant to censorship. So it seems logical
that we can add additional rules, performing in code the role of ICANN to govern the
registries, to make an operational naming infrastructure that could supplement DNS.
In fact, with new naming requirements brought about by the Internet of Things, it
could be really helpful to have an alternate naming infrastructure that has lower
transactions costs for people. Should consumers register a DNS domain to control
their own namespace? I don’t think this was the original intent of the design. I think
we thought organizations would be registering DNS names, not people.
Article resource:-http://www.blogster.com/thegluuserver/currency-of-identifiers-ii

More Related Content

Viewers also liked

Costa do Sahy Casas
Costa do Sahy CasasCosta do Sahy Casas
Costa do Sahy Casas
SuporteaoCorretor
 
Brookfield Place Worldwide Offices
Brookfield Place Worldwide OfficesBrookfield Place Worldwide Offices
Brookfield Place Worldwide Offices
SuporteaoCorretor
 
Expresso Acessível - 1º Seminário PHP no Serpro
Expresso Acessível - 1º Seminário PHP no SerproExpresso Acessível - 1º Seminário PHP no Serpro
Expresso Acessível - 1º Seminário PHP no Serpro
Flávio Lisboa
 
Cargadores inalambricos
Cargadores inalambricosCargadores inalambricos
Cargadores inalambricos
Angel Lockwood
 
BUAT NPIK-TEKSTIL EXPRESS
BUAT NPIK-TEKSTIL EXPRESSBUAT NPIK-TEKSTIL EXPRESS
BUAT NPIK-TEKSTIL EXPRESS
andri08121942042
 
Gerenciamento de Configurações - Puppet
Gerenciamento de Configurações - PuppetGerenciamento de Configurações - Puppet
Gerenciamento de Configurações - Puppet
Roberto Scudeller
 
Too Tecnologia orientada a objetos
Too Tecnologia orientada a objetosToo Tecnologia orientada a objetos
Too Tecnologia orientada a objetos
Frangelys Perez
 
ポッドキャスト利用による個別学習の支援とリスニング不安への影響
ポッドキャスト利用による個別学習の支援とリスニング不安への影響ポッドキャスト利用による個別学習の支援とリスニング不安への影響
ポッドキャスト利用による個別学習の支援とリスニング不安への影響
SAKAUE, Tatsuya
 
R のインストール手順(LET 2012用)
R のインストール手順(LET 2012用)R のインストール手順(LET 2012用)
R のインストール手順(LET 2012用)
SAKAUE, Tatsuya
 
LET2012 ワークショップ「R による教育・言語データ処理のススメ」
LET2012 ワークショップ「R による教育・言語データ処理のススメ」LET2012 ワークショップ「R による教育・言語データ処理のススメ」
LET2012 ワークショップ「R による教育・言語データ処理のススメ」SAKAUE, Tatsuya
 

Viewers also liked (10)

Costa do Sahy Casas
Costa do Sahy CasasCosta do Sahy Casas
Costa do Sahy Casas
 
Brookfield Place Worldwide Offices
Brookfield Place Worldwide OfficesBrookfield Place Worldwide Offices
Brookfield Place Worldwide Offices
 
Expresso Acessível - 1º Seminário PHP no Serpro
Expresso Acessível - 1º Seminário PHP no SerproExpresso Acessível - 1º Seminário PHP no Serpro
Expresso Acessível - 1º Seminário PHP no Serpro
 
Cargadores inalambricos
Cargadores inalambricosCargadores inalambricos
Cargadores inalambricos
 
BUAT NPIK-TEKSTIL EXPRESS
BUAT NPIK-TEKSTIL EXPRESSBUAT NPIK-TEKSTIL EXPRESS
BUAT NPIK-TEKSTIL EXPRESS
 
Gerenciamento de Configurações - Puppet
Gerenciamento de Configurações - PuppetGerenciamento de Configurações - Puppet
Gerenciamento de Configurações - Puppet
 
Too Tecnologia orientada a objetos
Too Tecnologia orientada a objetosToo Tecnologia orientada a objetos
Too Tecnologia orientada a objetos
 
ポッドキャスト利用による個別学習の支援とリスニング不安への影響
ポッドキャスト利用による個別学習の支援とリスニング不安への影響ポッドキャスト利用による個別学習の支援とリスニング不安への影響
ポッドキャスト利用による個別学習の支援とリスニング不安への影響
 
R のインストール手順(LET 2012用)
R のインストール手順(LET 2012用)R のインストール手順(LET 2012用)
R のインストール手順(LET 2012用)
 
LET2012 ワークショップ「R による教育・言語データ処理のススメ」
LET2012 ワークショップ「R による教育・言語データ処理のススメ」LET2012 ワークショップ「R による教育・言語データ処理のススメ」
LET2012 ワークショップ「R による教育・言語データ処理のススメ」
 

Similar to Currency of identifiers ii

Domain Name System
Domain Name SystemDomain Name System
Domain Name System
WhoisXML API
 
What Is DNS ?
What Is DNS ?What Is DNS ?
What Is DNS ?
GTCSYS
 
The domain name system
The domain name systemThe domain name system
The domain name system
HubBOG Accelerator
 
Blockchain Domain Crypto Payment New Asset Class Investment
Blockchain Domain Crypto Payment New Asset Class InvestmentBlockchain Domain Crypto Payment New Asset Class Investment
Blockchain Domain Crypto Payment New Asset Class Investment
Kyle Ransom
 
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
FindWhitePapers
 
Rick gardinier cbsnews com gtlds
Rick gardinier cbsnews com gtldsRick gardinier cbsnews com gtlds
Rick gardinier cbsnews com gtlds
Brunner
 
What is DePin or Decentralized Physical Infrastructure DePin for dummies.pdf
What is DePin or Decentralized Physical Infrastructure DePin for dummies.pdfWhat is DePin or Decentralized Physical Infrastructure DePin for dummies.pdf
What is DePin or Decentralized Physical Infrastructure DePin for dummies.pdf
Harman Puri
 
web hosting services reviews and comparisons
web hosting services reviews and comparisons web hosting services reviews and comparisons
web hosting services reviews and comparisons
newfasthost
 
Domain & Shared hosting
Domain & Shared hostingDomain & Shared hosting
Domain & Shared hosting
jisha-varkey
 
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand TelecommuniChapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
EstelaJeffery653
 
Dns and irc
Dns and ircDns and irc
Dns and irc
ZekriaMuzafar
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
Kapil Khatiwada
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
Security BSides London
 
The Promise of BlockChain
The Promise of BlockChainThe Promise of BlockChain
The Promise of BlockChain
Nevada County Tech Connection
 
Domain name
Domain nameDomain name
Domain name
Vishwajeet Patil
 
Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Celebrating 31 Years Of The Domain Name System (DNS) This Month!Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Marie Moore
 
State of the Internet Operating System
State of the Internet Operating SystemState of the Internet Operating System
State of the Internet Operating System
Tim O'Reilly
 
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Phreebird Suite 1.0:  Introducing the Domain Key InfrastructurePhreebird Suite 1.0:  Introducing the Domain Key Infrastructure
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Dan Kaminsky
 
DDoS mitigation in the real world
DDoS mitigation in the real worldDDoS mitigation in the real world
DDoS mitigation in the real world
Michael Renner
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
coastalgraphics
 

Similar to Currency of identifiers ii (20)

Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
What Is DNS ?
What Is DNS ?What Is DNS ?
What Is DNS ?
 
The domain name system
The domain name systemThe domain name system
The domain name system
 
Blockchain Domain Crypto Payment New Asset Class Investment
Blockchain Domain Crypto Payment New Asset Class InvestmentBlockchain Domain Crypto Payment New Asset Class Investment
Blockchain Domain Crypto Payment New Asset Class Investment
 
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
 
Rick gardinier cbsnews com gtlds
Rick gardinier cbsnews com gtldsRick gardinier cbsnews com gtlds
Rick gardinier cbsnews com gtlds
 
What is DePin or Decentralized Physical Infrastructure DePin for dummies.pdf
What is DePin or Decentralized Physical Infrastructure DePin for dummies.pdfWhat is DePin or Decentralized Physical Infrastructure DePin for dummies.pdf
What is DePin or Decentralized Physical Infrastructure DePin for dummies.pdf
 
web hosting services reviews and comparisons
web hosting services reviews and comparisons web hosting services reviews and comparisons
web hosting services reviews and comparisons
 
Domain & Shared hosting
Domain & Shared hostingDomain & Shared hosting
Domain & Shared hosting
 
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand TelecommuniChapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
 
Dns and irc
Dns and ircDns and irc
Dns and irc
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
The Promise of BlockChain
The Promise of BlockChainThe Promise of BlockChain
The Promise of BlockChain
 
Domain name
Domain nameDomain name
Domain name
 
Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Celebrating 31 Years Of The Domain Name System (DNS) This Month!Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Celebrating 31 Years Of The Domain Name System (DNS) This Month!
 
State of the Internet Operating System
State of the Internet Operating SystemState of the Internet Operating System
State of the Internet Operating System
 
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Phreebird Suite 1.0:  Introducing the Domain Key InfrastructurePhreebird Suite 1.0:  Introducing the Domain Key Infrastructure
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
 
DDoS mitigation in the real world
DDoS mitigation in the real worldDDoS mitigation in the real world
DDoS mitigation in the real world
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 

More from Gluu

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
Gluu
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
Gluu
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
Gluu
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
Gluu
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
Gluu
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
Gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
Gluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
Gluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Gluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
Gluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
Gluu
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
Gluu
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
Gluu
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
Gluu
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
Gluu
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
Gluu
 

More from Gluu (19)

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
 

Currency of identifiers ii

  • 1. Today, identity provider saml is always in the context of a DNS domain name. Registering your own domain is the only chance you have at privacy. However, domain name registration itself is privacy destroying. After seeing a recent bit Coin info graphic, it made me think of an old blog I wrote a few years back about an idea for an Internet naming system based on bit Coin. DNS is surely one of the great achievements of standards based inter-operability. The mere mention of a naming system other than DNS is verboden in Silicon Valley. But why do we need these silly “dotted” hierarchical naming systems. Why can’t I just be “mike”? Conventional wisdom is that a contextual naming system is needed for Internet scale. In a flat namespace, the “good” names will be immediately unavailable, and the rest of us will have to get some lame alternative that might as well be a DNS component. How many good Twitter IDs are going to be left after 100 years?
  • 2. It always seemed that being a TLD registrar was just too sweet of a deal. Its a natural monopoly. Sure with standard registries, we have some competition… but we’ve accepted that we have not only have to pay these marginally valuable middle men, but we waste lots of time getting things right, and then get lots of spammy offers we don’t care about. But if that’s not bad enough, how sweet it is to be the governor of the registries. One can only imagine the fringe benefits for board members of ICANN. And the announcement a while back that ICANN would auction new TLDs at market prices provides a new revenue stream for these technical pontiffs. Monash University is the first branded TLD. ICANN accruing the benefit of naming the Internet is the best we can do? When the architects of the Internet designed DNS, there was no distributed transaction technology like bit Coin. DNS was a fabulous solution. But now that we have a more efficient alternative, we should use it. My idea is that an “xCoin” would represent a globally resolvable identifier. X marks the spot. Like a dollar bill, the coin has a serial number. Unlike a dollar bill, it also has other attributes or “claims.” The xCoin rules can allow for these claims or the coins themselves to be transferred.
  • 3. There is some precedent for using bit Coin for DNS: name Coin. Name coin allows you to: (1) Securely register and transfer arbitrary names (keys); (2) Attach 1K of data to each name; (3) Trade and transact in Name coins. All of this is done pseudonymously (data is linked to a randomly generated addresses) and in a decentralized manner which is strongly resistant to censorship. So it seems logical that we can add additional rules, performing in code the role of ICANN to govern the registries, to make an operational naming infrastructure that could supplement DNS. In fact, with new naming requirements brought about by the Internet of Things, it could be really helpful to have an alternate naming infrastructure that has lower transactions costs for people. Should consumers register a DNS domain to control their own namespace? I don’t think this was the original intent of the design. I think we thought organizations would be registering DNS names, not people. Article resource:-http://www.blogster.com/thegluuserver/currency-of-identifiers-ii