Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
The Sigstore Trust Model
The Sigstore Trust Model
I hope this post can help reduce confusion around exactly how Sigstore’s trust model works, and how trust flows from the community root…
·dlorenc.medium.com·
The Sigstore Trust Model
Fighting TLS fingerprinting with Node.js
Fighting TLS fingerprinting with Node.js
The modern internet is full of services that want to know who you are. Fingerprinting is the latest way to do this: capturing many small…
·httptoolkit.tech·
Fighting TLS fingerprinting with Node.js
Why Trust and Integrity are Critical to IoT
Why Trust and Integrity are Critical to IoT
Trust and integrity are critical to the internet of things. If a business or consumers can’t trust the data, the IoT fails.
·devops.com·
Why Trust and Integrity are Critical to IoT
Permissions, Privileges, and Scopes
Permissions, Privileges, and Scopes
What is the difference between permissions, privileges, and scopes in the authorization context? Let's find out together.
·auth0.com·
Permissions, Privileges, and Scopes
Compliance As Property
Compliance As Property
In engineering, a common approach to security concerns is to address those requirements after delivery. This is inefficient for the following reasons: Fails to consider how the requirement(s) can b…
·postmodernsecurity.com·
Compliance As Property
Digital Memories
Digital Memories
Digital memories are an important component of our digital embodiment. SSI provides a foundation for self-sovereign digital memories to solve the digital-analog memory divide.
·windley.com·
Digital Memories
rfc2522
rfc2522
Photuris: Session-Key Management Protocol (RFC )
·datatracker.ietf.org·
rfc2522
Trusting trust, the unsolved security problem
Trusting trust, the unsolved security problem
What is the trusting trust problem? Schneier on Security, Countering "Trusting Trust" Way back in 1974, Paul Karger and Roger Schell discovered a devastating attack against computer systems. Ken Thompson described it in his classic 1984 speech, “Ref...
·erik.hashnode.dev·
Trusting trust, the unsolved security problem
Essentials for Integrating Identity - The New Stack
Essentials for Integrating Identity - The New Stack
When first integrating your apps with an IAM system, there is a learning curve to identify and meet the important requirements.
·thenewstack.io·
Essentials for Integrating Identity - The New Stack
Zero Knowledge Proofs
Zero Knowledge Proofs
Zero-knowledge proofs are a powerful cryptographic technique at the heart of self-sovereign identity (SSI). This post should help you understand what they are and how they can be used.
·windley.com·
Zero Knowledge Proofs
Language of Espionage
Language of Espionage
Learn spy terms, phrases, and code words with the International Spy Museum. Put in the work here and you’ll be using spy lingo in no time.
·spymuseum.org·
Language of Espionage
Fides Open Source
Fides Open Source
Data privacy software for businesses. Fides is a suite of open-source devtools and data tools for developers and privacy teams.
·ethyca.com·
Fides Open Source
Get a Handle on Software Supply Chain Security with LFX - The New Stack
Get a Handle on Software Supply Chain Security with LFX - The New Stack
The Linux Foundation has introduced LFX Security, a new tool to help secure software supply chains. It scans for vulnerabilities using Synk's open source security platform and looks for secrets-in-code and non-inclusive language using BluBracket's automatic scanning functionality.
·thenewstack.io·
Get a Handle on Software Supply Chain Security with LFX - The New Stack
Signatures: The secret behind modern end-to-end encryption
Signatures: The secret behind modern end-to-end encryption
Now that most of our communications are digital, a problem arises: How to keep our messages private despite all the intermediaries? Internet Service Providers (ISPs) and Service providers (Facebook, Telegram, Line, WeChat…) are all in a position of Man-In-The-Middle (MITM) and are able to inspect, record, and even modify our communications without our consent or knowledge. And this is before talking about malicious actors. ISP - service provide (ex: Chat) - ISP - Bob -- You may think that you have nothing to hide, so it doesn’t matter.
·kerkour.com·
Signatures: The secret behind modern end-to-end encryption