Posts – Page 5

Cryptography

Getting over Quantum Computers

Quantum Computers form a very real threat to online security. Most of today’s assumed-safe mechanisms are suddenly outdated. This is how the InternetWide Architecture tackles these threats.

>> Continue reading <<

Cryptography

KXOVER, the design of a protocol

Much of the work in our project centers around open protocols. We use as much of what we find as is, but new ideas sometimes call for new protocols, and the design of these is a bit of a roller-coaster ride. KXOVER is an interesting example.

>> Continue reading <<

IdentityHub

Backbone Innovations in the IdentityHub

While developing our IdentityHub, the core facility where users control their online identity and get security and privacy in one go, we need to connect a number of microservice. We made a few surprising choices and smile on the benefits.

>> Continue reading <<

software, web, security

Something's Cooking #4: Web Auth with SASL

When it comes to secure authentication, the web is in a much worse shape than email. But that's not due to email; it is the web that habitually ignores all the advances that are used everywhere else! Since the web is important, we want to extend HTTP with SASL, the general framework that works so well for almost all the other protocols.

>> Continue reading <<

identity

Identity 12: User Names in URLs

We weigh in heavily on the idea of Bring Your Own IDentity. How does this relate to URLs that we see in so many protocols? And especially the HTTP and AMQP URLs?

>> Continue reading <<