Posts tagged 'identity' – Page 3

architecture

Identity 10: OpenPGP without Web Of Trust

OpenPGP is a powerful technology for signing and encryption, because it does not imply a stiffling key infrastructure. Instead, it uses a Web Of Trust that is flexible... and complicating for new users. We now introduce an approach to securely use OpenPGP without even that.

>> Continue reading <<

architecture

Mail Routing 3: Doing DKIM Perfectly

DKIM is the technology that signs a message and some of its headers at a mail server en route; mostly this is done by the originator of the email. One problem remains that slows down its introduction as a hard filter, and that is email handling that edits the message and then forwards it, as is common for email lists. This article nails the integration of DKIM with forwarding.

>> Continue reading <<

architecture

Mail Routing 2: Doing SPF Perfectly

SPF is the technology that assures that mail only arrives from authentic senders. One problem remains that slows down its introduction as a hard filter, and that is email forwarding. This article nails the integration of SPF with forwarding.

>> Continue reading <<

architecture,identity

NGI 3: Own your IDentity

When you were born, your parents selected a name (usually one that was not given to any siblings yet) and attached one of their last names. They registered you with that combination, and this is how you have been known for all your life. Wouldn't it be eerie when, upon registration of your name, the clerk had told you that all last names are coerced to that of an industrial who is currently sponsoring a new highway project? On today's Internet, this pattern is standard practice!

>> Continue reading <<

architecture

Identity 9: Phone Numbers are User Identities

Although the InternetWide Architecture is building structures to support advanced modern-day users now and in the far future, the properties of personal control over online identity can start really modest, with a simple phone number.

>> Continue reading <<