Posts tagged 'identity'

identity

Identity 12: User Names in URLs

We weigh in heavily on the idea of Bring Your Own IDentity. How does this relate to URLs that we see in so many protocols? And especially the HTTP and AMQP URLs?

>> Continue reading <<

architecture

Identity 10: OpenPGP without Web Of Trust

OpenPGP is a powerful technology for signing and encryption, because it does not imply a stiffling key infrastructure. Instead, it uses a Web Of Trust that is flexible... and complicating for new users. We now introduce an approach to securely use OpenPGP without even that.

>> Continue reading <<

architecture

Mail Routing 3: Doing DKIM Perfectly

DKIM is the technology that signs a message and some of its headers at a mail server en route; mostly this is done by the originator of the email. One problem remains that slows down its introduction as a hard filter, and that is email handling that edits the message and then forwards it, as is common for email lists. This article nails the integration of DKIM with forwarding.

>> Continue reading <<

architecture

Mail Routing 2: Doing SPF Perfectly

SPF is the technology that assures that mail only arrives from authentic senders. One problem remains that slows down its introduction as a hard filter, and that is email forwarding. This article nails the integration of SPF with forwarding.

>> Continue reading <<

architecture,identity

NGI 3: Own your IDentity

When you were born, your parents selected a name (usually one that was not given to any siblings yet) and attached one of their last names. They registered you with that combination, and this is how you have been known for all your life. Wouldn't it be eerie when, upon registration of your name, the clerk had told you that all last names are coerced to that of an industrial who is currently sponsoring a new highway project? On today's Internet, this pattern is standard practice!

>> Continue reading <<