Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Compliance As Property
Compliance As Property
In engineering, a common approach to security concerns is to address those requirements after delivery. This is inefficient for the following reasons: Fails to consider how the requirement(s) can b…
·postmodernsecurity.com·
Compliance As Property
Digital Memories
Digital Memories
Digital memories are an important component of our digital embodiment. SSI provides a foundation for self-sovereign digital memories to solve the digital-analog memory divide.
·windley.com·
Digital Memories
rfc2522
rfc2522
Photuris: Session-Key Management Protocol (RFC )
·datatracker.ietf.org·
rfc2522
Trusting trust, the unsolved security problem
Trusting trust, the unsolved security problem
What is the trusting trust problem? Schneier on Security, Countering "Trusting Trust" Way back in 1974, Paul Karger and Roger Schell discovered a devastating attack against computer systems. Ken Thompson described it in his classic 1984 speech, “Ref...
·erik.hashnode.dev·
Trusting trust, the unsolved security problem
Essentials for Integrating Identity - The New Stack
Essentials for Integrating Identity - The New Stack
When first integrating your apps with an IAM system, there is a learning curve to identify and meet the important requirements.
·thenewstack.io·
Essentials for Integrating Identity - The New Stack
Zero Knowledge Proofs
Zero Knowledge Proofs
Zero-knowledge proofs are a powerful cryptographic technique at the heart of self-sovereign identity (SSI). This post should help you understand what they are and how they can be used.
·windley.com·
Zero Knowledge Proofs
Language of Espionage
Language of Espionage
Learn spy terms, phrases, and code words with the International Spy Museum. Put in the work here and you’ll be using spy lingo in no time.
·spymuseum.org·
Language of Espionage
Fides Open Source
Fides Open Source
Data privacy software for businesses. Fides is a suite of open-source devtools and data tools for developers and privacy teams.
·ethyca.com·
Fides Open Source
Get a Handle on Software Supply Chain Security with LFX - The New Stack
Get a Handle on Software Supply Chain Security with LFX - The New Stack
The Linux Foundation has introduced LFX Security, a new tool to help secure software supply chains. It scans for vulnerabilities using Synk's open source security platform and looks for secrets-in-code and non-inclusive language using BluBracket's automatic scanning functionality.
·thenewstack.io·
Get a Handle on Software Supply Chain Security with LFX - The New Stack
Signatures: The secret behind modern end-to-end encryption
Signatures: The secret behind modern end-to-end encryption
Now that most of our communications are digital, a problem arises: How to keep our messages private despite all the intermediaries? Internet Service Providers (ISPs) and Service providers (Facebook, Telegram, Line, WeChat…) are all in a position of Man-In-The-Middle (MITM) and are able to inspect, record, and even modify our communications without our consent or knowledge. And this is before talking about malicious actors. ISP - service provide (ex: Chat) - ISP - Bob -- You may think that you have nothing to hide, so it doesn’t matter.
·kerkour.com·
Signatures: The secret behind modern end-to-end encryption
EBCDIC is incompatible with GDPR
EBCDIC is incompatible with GDPR
Welcome to acronym city! The Court of Appeal of Brussels has made an interesting ruling. A customer complained that their bank was spelling the customer’s name incorrectly. The bank didn&#821…
·shkspr.mobi·
EBCDIC is incompatible with GDPR
Sequoia-PGP
Sequoia-PGP
Sequoia is a modular OpenPGP implementation in Rust.
·sequoia-pgp.org·
Sequoia-PGP