Posts tagged 'identity' – Page 2

identity

Identity 14: Bootstrapping Online Identity

Users forget passwords all the time. This leads to an email sent to an address whose password you ought to have. If not, you may cascade back into your online history, ending in your dial-in modem account with an ISP that does not exist anymore. Something is wrong here...

>> Continue reading <<

identity

Identity 13: Be Your Own IDentity Provider

If you want to Bring Your Own IDentity (BYOID) to foreign servers you will somehow need to offer an identity provider to them. How would that work?

>> Continue reading <<

identity

Identity 12: User Names in URLs

We weigh in heavily on the idea of Bring Your Own IDentity. How does this relate to URLs that we see in so many protocols? And especially the HTTP and AMQP URLs?

>> Continue reading <<

architecture

Identity 10: OpenPGP without Web Of Trust

OpenPGP is a powerful technology for signing and encryption, because it does not imply a stiffling key infrastructure. Instead, it uses a Web Of Trust that is flexible... and complicating for new users. We now introduce an approach to securely use OpenPGP without even that.

>> Continue reading <<

architecture

Mail Routing 3: Doing DKIM Perfectly

DKIM is the technology that signs a message and some of its headers at a mail server en route; mostly this is done by the originator of the email. One problem remains that slows down its introduction as a hard filter, and that is email handling that edits the message and then forwards it, as is common for email lists. This article nails the integration of DKIM with forwarding.

>> Continue reading <<