Posts tagged 'architecture'

identity

Identity 15: Entering Security Codes

Strong security starts with big numbers, in the range of 38 digits (128 bits) for the current level, with an imminent upgrade to 77 digits (256 bits) to thwart Quantum Computers. We can make such security codes a little less dreadful to use.

>> Continue reading <<

identity

Identity 14: Bootstrapping Online Identity

Users forget passwords all the time. This leads to an email sent to an address whose password you ought to have. If not, you may cascade back into your online history, ending in your dial-in modem account with an ISP that does not exist anymore. Something is wrong here...

>> Continue reading <<

identity

Identity 13: Be Your Own IDentity Provider

If you want to Bring Your Own IDentity (BYOID) to foreign servers you will somehow need to offer an identity provider to them. How would that work?

>> Continue reading <<

architecture

Reservoir: Your Data reaching out to You

Many of us rely on "cloud" storage services. They enable us to access the same files from everywhere, but they are fairly dumb and leave all the thinking to people. ARPA2 Reservoir is different, in that it supports metadata, automation and integration in your tools.

>> Continue reading <<

Protocols

It's All about Protocols!

This blog reports about software design for the InternetWide Architecture. Something that we might easily forget however, is what is the true nature of the InternetWide project. In the end, it's not about software -- instead, it is all about protocols.

>> Continue reading <<