Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
foaf+ssl: creating a web of trust without key signing parties
foaf+ssl: creating a web of trust without key signing parties
The concept of a Web of Trust is most closely associated with Phil Zimmerman and PGP. The basic idea is that by signing each other's keys, usually at things like key signing parties, people could grow the network of keys they trusted to sign or encrypt documents such as email, sign legal documents, etc... The distributed system of trust feels right, but the idea never really took off, even though the keysigning parties must have been fun, probably because they still required physical presence. In foaf+ssl we are also using a Web of Trust mechanism, but as I will show here, this does not require key signing, and furthermore it uses PKI to do this (some may say it subverts PKI to do this). It should therefore be able to grow much faster, and hopefully give us the same benefits.
·web.archive.org·
foaf+ssl: creating a web of trust without key signing parties
Product Security Plans: What They Are and Why They Matter
Product Security Plans: What They Are and Why They Matter
Product security plans and automating security with security as code offer a new — and better — approach to achieving app and cloud security goals.
·thenewstack.io·
Product Security Plans: What They Are and Why They Matter
User Beware: The Fine Line Between Content And Code
User Beware: The Fine Line Between Content And Code
Everyone loves themes. Doesn’t matter if it’s a text editor or a smart display in the kitchen, we want to be able to easily customize its look and feel to our liking. When setting up a …
·hackaday.com·
User Beware: The Fine Line Between Content And Code
HTTP Sig Demo
HTTP Sig Demo
How to secure BigData or microservices efficiently on the Web
·medium.com·
HTTP Sig Demo
Keyoxide
Keyoxide
Modern and secure platform to manage a decentralized identity based on cryptographic keys
·keyoxide.org·
Keyoxide
Blog: Google's Threat model for Post-Quantum Cryptography
Blog: Google's Threat model for Post-Quantum Cryptography
Read on to understand how Google currently evaluates the threat landscape related to post-quantum cryptography, and what implications this has for migrating from classical cryptographic algorithms to PQC.
·bughunters.google.com·
Blog: Google's Threat model for Post-Quantum Cryptography
3 Steps to Make Logins with Passkeys Reliable
3 Steps to Make Logins with Passkeys Reliable
When I first used passkeys, I felt they had too many issues to be used in production, but I’ve changed my mind. I recommend these steps for using them.
·thenewstack.io·
3 Steps to Make Logins with Passkeys Reliable
Musings on Auth: How do we authenticate?
Musings on Auth: How do we authenticate?
Authentication is central to securing applications and enabling personalised websites. This post discusses the different forms of authentication used in software.
·nicholashairs.com·
Musings on Auth: How do we authenticate?
🔐 The Best Memorable Password Generator ever!
🔐 The Best Memorable Password Generator ever!
The Best Memorable Password Generator ever that is completely free. Easily create secure, unique and strong passwords in no time.
·memorablepasswordgenerator.com·
🔐 The Best Memorable Password Generator ever!
Row Level Security | Tutorials | Crunchy Data
Row Level Security | Tutorials | Crunchy Data
Learn how to use Postgres’ Row Level Security functionality. It’s a great tool for managing key-based partitioning in a multi-tenant world.
·crunchydata.com·
Row Level Security | Tutorials | Crunchy Data
How to stay safe from repo-jacking
How to stay safe from repo-jacking
Repo-jacking is a specific type of supply chain attack. This blog post explains what it is, what the risk is, and what you can do to stay safe.
·github.blog·
How to stay safe from repo-jacking
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
DNS resolvers (those that handle DNSSEC, at least) are almost uniformly vulnerable to an exploit that has been named "KeyTrap". In short, the right type of packet can send a DNS system into something close to an infinite loop, taking it out of service indefinitely.
·lwn.net·
The "KeyTrap" DNS vulnerability
How are WLAN Infrastructures in Enterprises Secured?
How are WLAN Infrastructures in Enterprises Secured?
Learn about the scalability challenges of Pre-shared (PSK) configurations in the enterprise, as well as how 802.1X addresses and resolves them elegantly.
·tbhaxor.com·
How are WLAN Infrastructures in Enterprises Secured?
Zero Trust with Zero Data
Zero Trust with Zero Data
The physical world is full of zero trust examples, but they gather attributes for the access control decisions in a very different way than we're used to online.
·windley.com·
Zero Trust with Zero Data
Zero Trust made simple
Zero Trust made simple
Rest assured, adopting a Zero Trust strategy need not be overwhelming or complicated —we encourage gradual implementation and highlight the potential for steady progress and strengthened resilience within any organization. Get started on your Zero Trust journey today.
·networkworld.com·
Zero Trust made simple