Latest posts

architecture

Identity 17: Future Warfare may be about Identity

Wars shift from using brute metallic instruments of opression, to ever more (mis)information as a battle force. With a bit of imagination, we can get an idea of the instruments that could be used in future warfare.

>> Continue reading <<

adminstration

Access 5: Juggling Keys in the Rules DB

Access Control is powerful. System-central storage is a bit iffy. How do we stop people from abusive tapping?

>> Continue reading <<

adminstration

Access 4: ARPA2 Access Control for Mail

We just demonstrated how you can configure access control in a local database. The next step is to actually put it to use. Lets control our email!

>> Continue reading <<

adminstration

Access 3: ARPA2 Access Control and Groups for Admins

Let's say you own a domain name, and have software that uses ARPA2 Access Control. How, then, can you grant or revoke access?

>> Continue reading <<

Philosophy

Think Globally, Act Locally

Christmas is a time for reflection, certainly in 2020. What is the World doing, what is our role in it, and can we improve in the next year?

>> Continue reading <<