![]() ![]() Tribler identity and blockchain expertiseġ7 years ago the Tribler team published sketches of 'open information pools' with a crowdsourced identity system module: unbiased truth about subjects, phenomena, people, place, objects, companies, etc. Blockchain technology is still maturing, but has the ability to provide a tamper-proof ecosystem with automated end-to-end integrity checking. Current identity systems are fragmented and siloed between various service providers, requiring password managers and resulting in insecure systems. As continued hacks of the global inter-banking system show, a system is only as strong as it's weakest server/country/module or Flash plugin version. Strong state-based adversaries have the proven ability to compromise highly-connected nodes in the web of trust, compromise servers, and falsify real-world identity documents. like manual comparing server Merkle hashes). It is insufficient to base security and integrity on "out-of-band secure communication" (e.g. End-to-end integrity checking and tamper-proofness is required. Central identity servers from Google, Facebook, and RSA are essentially data honeypots. The missing element from Keybase and other server-based solutions is fully automated detection of corruption in any part of the global infrastructure. ![]() Each participant has access to your public key and trusts that it really belongs to you, along with a verification proof. ![]() The security of the whole ecosystem relies on authenticated public keys. Revocations: "I take back what I said earlier"īlockchain technology provides the missing element to create a global Internet Identity layer, tamper-proof identities, in our opinion. Key ownership: "I am Joe on Keybase and here's my public key"Ĥ. Follower statements: "I am Joe on Keybase and I just looked at Chris's identity"ģ. Identity proofs: "I am Joe on Keybase and MrJoe on Twitter"Ģ. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |