Identity 13: Be Your Own IDentity Provider
If you want to Bring Your Own IDentity (BYOID) to foreign servers you will somehow need to offer an identity provider to them. How would that work?
>> Continue reading <<
If you want to Bring Your Own IDentity (BYOID) to foreign servers you will somehow need to offer an identity provider to them. How would that work?
>> Continue reading <<
Many of us rely on "cloud" storage services. They enable us to access the same files from everywhere, but they are fairly dumb and leave all the thinking to people. ARPA2 Reservoir is different, in that it supports metadata, automation and integration in your tools.
>> Continue reading <<
This blog reports about software design for the InternetWide Architecture. Something that we might easily forget however, is what is the true nature of the InternetWide project. In the end, it's not about software -- instead, it is all about protocols.
>> Continue reading <<
Given the predictable future of Quantum Computing, the design of TLS 1.3 is at risk, and an upgrade might be a bad idea, in spite of the many improvements to the security design. We explain why and how TLS 1.3 can be a blessing in terms of just this danger.
>> Continue reading <<
Quantum Computers form a very real threat to online security. Most of today’s assumed-safe mechanisms are suddenly outdated. This is how the InternetWide Architecture tackles these threats.
>> Continue reading <<