Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
Identity and behaviour
Identity and behaviour
In Object Oriented programming, identity and behaviour are often conflated. But it can be usefuk to think of them as different concepts.
·ismaelcelis.com·
Identity and behaviour
Encrypting Files with Passkeys and age
Encrypting Files with Passkeys and age
Encrypting files with passkeys, using the WebAuthn prf extension and the TypeScript age implementation.
·words.filippo.io·
Encrypting Files with Passkeys and age
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to
In the past few years, governments across the world have rolled out digital identification options, and now there are efforts encouraging online companies to implement identity and age verification
·eff.org·
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to
The “Bubble” of Risk: Improving Assessments for Offensive Cybersecurity Agents - CITP Blog
The “Bubble” of Risk: Improving Assessments for Offensive Cybersecurity Agents - CITP Blog
Authored by Boyi Wei Most frontier models today undergo some form of safety testing, including whether they can help adversaries launch costly cyberattacks. But many of these assessments overlook a critical factor: adversaries can adapt and modify models in ways that expand the risk far beyond the perceived safety profile that static evaluations capture.  At […]
·blog.citp.princeton.edu·
The “Bubble” of Risk: Improving Assessments for Offensive Cybersecurity Agents - CITP Blog
Magic Links Have Rough Edges, but Passkeys Can Smooth Them Over
Magic Links Have Rough Edges, but Passkeys Can Smooth Them Over
Magic links, those emailed one-time login links, are annoying and inconvenient for folks who use a password manager, but they radically accept some fundamental truths about signing in for everyone else. By layering passkeys on top of magic links, websites can provide a seamless authentication experience for all users.
·rmondello.com·
Magic Links Have Rough Edges, but Passkeys Can Smooth Them Over
What We Wish We Knew About Container Security
What We Wish We Knew About Container Security
What we’ve learned the hard way: Isolation might be the most important primitive in distributed computing that we still haven’t gotten right.
·thenewstack.io·
What We Wish We Knew About Container Security
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising technology that powers a sprawling ecosystem of online hucksters and website hackers. A new report…
·krebsonsecurity.com·
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
Crowdsourcing SIGINT: Ham Radio At War
Crowdsourcing SIGINT: Ham Radio At War
I often ask people: What’s the most important thing you need to have a successful fishing trip? I get a lot of different answers about bait, equipment, and boats. Some people tell me beer. Bu…
·hackaday.com·
Crowdsourcing SIGINT: Ham Radio At War
5 common authentication methods for NHIs | Cerbos
5 common authentication methods for NHIs | Cerbos
Understand the common authentication methods used for NHIs, each method's architecture, typical use cases, and real-world security posture.
·cerbos.dev·
5 common authentication methods for NHIs | Cerbos
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been…
·krebsonsecurity.com·
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
Trust Math, Not People
Trust Math, Not People
The Dangerous Illusion of Trustless Systems
·notesfromthecircus.com·
Trust Math, Not People
DID Authentication | DIDWeb.org
DID Authentication | DIDWeb.org
DID Authentication is a protocol that enables the controller of an DID to sign a random message. In other words, giving proof of ownership of a DID.
·didweb.org·
DID Authentication | DIDWeb.org
Advanced Cryptography
Advanced Cryptography
Deciding when to use Advanced Cryptography to protect your data
·ncsc.gov.uk·
Advanced Cryptography
Establishing First Person Digital Trust
Establishing First Person Digital Trust
Key signing parties attempted to establish decentralized trust but they ultimately failed due to poor usability, lack of incentives, and shallow trust models. Verifiable Relationship Credentials (VRCs) provide a modern, peer-to-peer approach that enables actionable, contextual trust built on decentralized identifiers, and secure messaging. First-person identity emerges from direct connections that form relationships, mutual authentication, and portable, verifiable trust.
·windley.com·
Establishing First Person Digital Trust
First Person Identity
First Person Identity
Listening to Drummond Reed at VRM Day, I was struck by how “first person”—a term that resonates more intuitively than “self-sovereign”—captures the essence of empowering individuals to build digital relationships rooted in personal agency, without intermediaries.
·windley.com·
First Person Identity
Zero Trust, Least Privilege, and Just-in-Time Access
Zero Trust, Least Privilege, and Just-in-Time Access
When dynamic access control with JIT access is thoughtfully implemented, you shift the burden of security from employees to systems that automate protection, making it proactive and intelligent.
·windley.com·
Zero Trust, Least Privilege, and Just-in-Time Access