Posts in 'architecture' – Page 2

architecture

Identity 10: The link with Peer-to-Peer Networking

Throughout our identity document series, we have assumed that we were designing for domain hosting. This does not mean that we discard a highly useful movement towards peer-to-peer (or P2P) networking. Allow us to illuminate how we can see these approaches merge.

>> Continue reading <<

architecture

Identity 10: OpenPGP without Web Of Trust

OpenPGP is a powerful technology for signing and encryption, because it does not imply a stiffling key infrastructure. Instead, it uses a Web Of Trust that is flexible... and complicating for new users. We now introduce an approach to securely use OpenPGP without even that.

>> Continue reading <<

architecture

Mail Routing 3: Doing DKIM Perfectly

DKIM is the technology that signs a message and some of its headers at a mail server en route; mostly this is done by the originator of the email. One problem remains that slows down its introduction as a hard filter, and that is email handling that edits the message and then forwards it, as is common for email lists. This article nails the integration of DKIM with forwarding.

>> Continue reading <<

architecture

Mail Routing 2: Doing SPF Perfectly

SPF is the technology that assures that mail only arrives from authentic senders. One problem remains that slows down its introduction as a hard filter, and that is email forwarding. This article nails the integration of SPF with forwarding.

>> Continue reading <<

architecture

Using SASL with HTTP, Mail and LDAP in Nginx

All our work on identity must somehow end up benefiting applications. One of most interesting bits of software to do this is a frontend proxy. As so often, we find a few parts missing to complete our vision of a better-unified Internet.

>> Continue reading <<