1. How are compromised keys immediately detected and replays prevented?
2. Is there documentation about the kind of immutable log that's used?
(I understand blockchain and DLTs, I'm very curious.)
3. Does the guarantee basically come down to Microsoft's trusted signature?
1. How are compromised keys immediately detected and replays prevented?
2. Is there documentation about the kind of immutable log that's used?
(I understand blockchain and DLTs, I'm very curious.)
3. Does the guarantee basically come down to Microsoft's trusted signature?
So, here's the warning for smart contract blockchain users. This was a client-side problem. Don't let your applications execute smart contract data without checking.
Be careful.
So, here's the warning for smart contract blockchain users. This was a client-side problem. Don't let your applications execute smart contract data without checking.
Be careful.
We're working to make security less dependent on humans trying to outsmart AI.
It would work (it's PKI without the trusted middles).
We could use help to get adoption, all hands are welcome!
We're working to make security less dependent on humans trying to outsmart AI.
It would work (it's PKI without the trusted middles).
We could use help to get adoption, all hands are welcome!
2-factor authentication fails to protect consumers.
It asks you to give your credentials without knowing who is on the other side.
That's what happens in help desk scams.
We must have *mutual* authentication in order to be truly secure.
You deserve it. We all do.
2-factor authentication fails to protect consumers.
It asks you to give your credentials without knowing who is on the other side.
That's what happens in help desk scams.
We must have *mutual* authentication in order to be truly secure.
You deserve it. We all do.
So nice to meet you!
So nice to meet you!
Yes! NFC technology! Much better than QR codes. Was that your invention? That's excellent.
Supply chain is a natural for blockchains, I agree. We're applying that concept to the information supply chain. We have mints without smart contracts (more secure) and global state awareness. 🥂
Yes! NFC technology! Much better than QR codes. Was that your invention? That's excellent.
Supply chain is a natural for blockchains, I agree. We're applying that concept to the information supply chain. We have mints without smart contracts (more secure) and global state awareness. 🥂
There's always something, please keep them coming!
Happy Friday.
There's always something, please keep them coming!
Happy Friday.
I have a fix for this. Now I need to figure out how to sell it to an airline!
I have a fix for this. Now I need to figure out how to sell it to an airline!
Yet each phase sounds like the same problem. A spoof.
That's why I'd like our local public key infrastructure to be adopted.
Check the blockchain ledger for the public key of whoever is requesting contact with you. If it's not there, don't reply.
Lookup and challenge can be automated
Yet each phase sounds like the same problem. A spoof.
That's why I'd like our local public key infrastructure to be adopted.
Check the blockchain ledger for the public key of whoever is requesting contact with you. If it's not there, don't reply.
Lookup and challenge can be automated
I'm working on a secure communications layer where the sender of the message must use a public key.
The recipient is able to identify the sender's signature and need only pay attention to those secret messages.
Do that first, then enjoy steganography.
I'm working on a secure communications layer where the sender of the message must use a public key.
The recipient is able to identify the sender's signature and need only pay attention to those secret messages.
Do that first, then enjoy steganography.
That's very helpful and encouraging. I will take your advice. 🙏
That's very helpful and encouraging. I will take your advice. 🙏
I assume there's the actual data that was released, which is public fair use, but what about the other files and records derived from those?
Were releases signed that would allow reproduction elsewhere?
Or is that a pipedream?
I assume there's the actual data that was released, which is public fair use, but what about the other files and records derived from those?
Were releases signed that would allow reproduction elsewhere?
Or is that a pipedream?