SlideShare ist ein Scribd-Unternehmen logo
1 von 45
June 10, 2019 / ricardo@samsungnext.com
@ArgesRic
https://mastodon.social/@ricardojmendez/
Identity, Privacy and
the Edge
Ricardo J. Méndez
@argesric @samsungnext
• Give a small taxonomy of useful labels and categories;
• Walk you through what a layered conceptual model for identity could be like;
• Talk about the privacy implications for how we go about implementing things;
• Hopefully convince you that the closer to the edge we process things, the better
it is for the user…
• … but that the edge does not guarantee privacy.
Goals!
@argesric @samsungnext
●Justine Humenansky
●Ricardo J. Méndez
●Gus Warren
●David Crocker(BBW)
●WesleyDunnington (Ping Identity)
●JacobyThwaites (OnFido)
●PG, DJ, AL (*)
Work in progress…
Samsung NEXT Internet Identity Workshop XXVIII
* Didn’t hear back about naming them.
Privacy and GDPR, y’all!
Definitions
@argesric @samsungnext
Identity is everything that
defines you.
@argesric @samsungnext
Digital identity is what emerges
from your online life.
@argesric @samsungnext
Facts and Characteristics
@argesric @samsungnext
• Specific details about an individual.
• Personally-identifying information, such as:
• Your name…
• Username/password pairs…
• Shipping addresses…
• Phone and passport numbers.
• Facts are involved in verification and authentication.
Facts
@argesric @samsungnext
●Mailing address
●Username/password
●Phone number
●E-mail address
●Legal name
●Driver’s license
●Passport
●Income statements
Two types of Facts
Self-asserted Externally Validated
CredentialsIdentifiers
@argesric @samsungnext
Which one depends on context.
@argesric @samsungnext
I am not a bundle of Facts.
@argesric @samsungnext
• Characteristics emerge from your daily activities, can be scried from the data
exhaust:
• Personal interests, tastes, habits;
• What you avoid;
• How you react to things;
• Can change through the years;
Characteristics are unstructured
@argesric @samsungnext
Characteristics can have value
even divorced from Identifiers.
That relates them to behavioral
patterns and monetization.
A conceptual model
@argesric @samsungnext
OSI Model
https://en.w ikipedia.org/wiki/OSI_model
@argesric @samsungnext
Helps you answer: where does a
new piece fit?
@argesric @samsungnext
Layer Name Description Examples
7 Application
User- or system-levelflow sthat involve identities and other
systems
Sign-in account recovery, payment, w allet app on smartphone
6 Workflow
Protocol flow s between connected identities only (external
choreography)
DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data
formats/ encryption
5 Transaction
How runtime capabilities of an identity are defined and
invoked (internal orchestration)
Retrieval of attributes including PII, derived PII and their computation,
attestations, plug-in capabilities
4 Connection
How identities accept connections fromother identities and
systems
Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me
3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code
2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs
* WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
7-Layer Conceptual Model of Identity*
@argesric @samsungnext
Layer Name Description Examples
7 Application
User- or system-levelflow sthat involve identities and other
systems
Sign-in account recovery, payment, w allet app on smartphone
6 Workflow
Protocol flow s between connected identities only (external
choreography)
DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data
formats/ encryption
5 Transaction
How runtime capabilities of an identity are defined and
invoked (internal orchestration)
Retrieval of attributes including PII, derived PII and their computation,
attestations, plug-in capabilities
4 Connection
How identities accept connections fromother identities and
systems
Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me
3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code
2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs
7-Layer Conceptual Model of Identity*
* WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
@argesric @samsungnext
Layer Name Description Examples
7 Application
User- or system-levelflow sthat involve identities and other
systems
Sign-in account recovery, payment, w allet app on smartphone
6 Workflow
Protocol flow s between connected identities only (external
choreography)
DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data
formats/ encryption
5 Transaction
How runtime capabilities of an identity are defined and
invoked (internal orchestration)
Retrieval of attributes including PII, derived PII and their computation,
attestations, plug-in capabilities
4 Connection
How identities accept connections fromother identities and
systems
Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me
3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code
2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs
7-Layer Conceptual Model of Identity*
* WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
@argesric @samsungnext
Layer Name Description Examples
7 Application
User- or system-levelflow sthat involve identities and other
systems
Sign-in account recovery, payment, w allet app on smartphone
6 Workflow
Protocol flow s between connected identities only (external
choreography)
DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data
formats/ encryption
5 Transaction
How runtime capabilities of an identity are defined and
invoked (internal orchestration)
Retrieval of attributes including PII, derived PII and their computation,
attestations, plug-in capabilities
4 Connection
How identities accept connections fromother identities and
systems
Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me
3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code
2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs
7-Layer Conceptual Model of Identity*
* WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
@argesric @samsungnext
Layer Name Description Examples
7 Application
User- or system-levelflow sthat involve identities and other
systems
Sign-in account recovery, payment, w allet app on smartphone
6 Workflow
Protocol flow s between connected identities only (external
choreography)
DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data
formats/ encryption
5 Transaction
How runtime capabilities of an identity are defined and
invoked (internal orchestration)
Retrieval of attributes including PII, derived PII and their computation,
attestations, plug-in capabilities
4 Connection
How identities accept connections fromother identities and
systems
Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me
3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code
2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs
7-Layer Conceptual Model of Identity*
* WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
@argesric @samsungnext
Vocabulary helps you communicate.
Communication is fundamental.
System design and its
impact on privacy
@argesric @samsungnext
https://www.nytimes.com/2019/05/07/opinion/google-sundar-pichai-privacy.html
“We'll take all your data and just
not sell it directly.”
(Paraphrasing)
@argesric @samsungnext
https://www.facebook.com/notes/mark-zuckerberg/a-privacy-focused-vision-for-social-networking/10156700570096634/
“We’re going to be private
because we’ll be encrypted.”
(Paraphrasing)
@argesric @samsungnext
@argesric @samsungnext
@argesric @samsungnext
• If you trust…
• Their pinky-swear promise of not being evil;
• They will properly implement controls so that no employees can abuse their
power;
• They are infallible engineers whose data will never leak;
• Not like, say, people who keep passwords in cleartext…
• … for over 14 years. *
• Then that’s fine, I guess.
Pinky-swear privacy involves trust
* https://www.businessinsider.com/google-g-suite-passwords-stored-plaintext-2019-5
@argesric @samsungnext
Edge processing can be
privacy-enhancing.
It is not privacy-guaranteeing.
@argesric @samsungnext
• I am online usually in a specific time zone,
• Which IP addresses my connections come from,
• That I got served ads that skew towards movies and anime,
• That I click on ads about cat food every 3-4 weeks,
• That I never click on ads about nearby KFCs.
Encryption != Privacy
Five data points…
@argesric @samsungnext
You don’t even need
someone’s identity facts, if
you know all their
characteristics.
Make it better
@argesric @samsungnext
Facebook announced a $3-5Bn fine.
Their valuation shot up by $40Bn.
https://www.washingtonpost.com/technology/2019/04/24/facebook-sets-aside-billions-dollars-potential-ftc-fine/
@argesric @samsungnext
• Regulation and fines aren't going to get us out of this mess;
• People won't leave because of scandals or screw-ups (or they'd have done it
already);
• People won't switch because your solution is more ethical - we already have
those, and people don't use them.
If you’re working on identity
@argesric @samsungnext
Give them a good reason.
Enable them to do something
they couldn’t do before.
@argesric @samsungnext
Identity is sticky.
There’s a fear of impermanence.
@argesric @samsungnext
“Government must come to be
the place where the most basic
online identity will be grounded
in the long term.”
Jaron Lanier, Who Owns the Future?
@argesric @samsungnext
Users’ identity will always be
subordinate to whomever
controls the root.
@argesric @samsungnext
Online identity must be self-
sovereign.
Christopher Allen, The Path to Self-sovereign Identity
https://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html
@argesric @samsungnext
This is not only a moral necessity.
Self-sovereign identity will enable
new interactions.
@argesric @samsungnext
Users must be in control of their data.
We need to move it to the edge.
The Edge needs a
humanistic focus
@argesric @samsungnext
Think not only about where we
process the data, but about who
controls that node and its output.
@argesric @samsungnext
We are not talking about edge devices.
We are talking about people.
Control must lie with them.
@argesric @samsungnext
Let’s talk.
Contact: ricardo@samsungnext.com

Weitere ähnliche Inhalte

Was ist angesagt?

Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public SafetyAdam Lewis
 
The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0Adam Lewis
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -Naoto Miyachi
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaperHai Nguyen
 
76 s201923
76 s20192376 s201923
76 s201923IJRAT
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3Ankita Dave
 
Automated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking SectorAutomated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking Sectordbpublications
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes csandit
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
 

Was ist angesagt? (20)

Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
 
FirstNet ICAM
FirstNet ICAMFirstNet ICAM
FirstNet ICAM
 
The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
 
325 330
325 330325 330
325 330
 
76 s201923
76 s20192376 s201923
76 s201923
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3
 
Automated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking SectorAutomated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking Sector
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
 

Ähnlich wie Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy and the Edge

ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Synacts
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymousnexgentech15
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
Street conf overview
Street conf overviewStreet conf overview
Street conf overviewericsachs
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaicationSean Xiong
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATUREProfesia Srl, Lynx Group
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6 WE-IT TUTORIALS
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 

Ähnlich wie Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy and the Edge (20)

ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
120 i143
120 i143120 i143
120 i143
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Street conf overview
Street conf overviewStreet conf overview
Street conf overview
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaication
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 

Mehr von Techsylvania

Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models UnlistedTom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models UnlistedTechsylvania
 
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0Techsylvania
 
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...Techsylvania
 
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCPAarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCPTechsylvania
 
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?Techsylvania
 
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...Techsylvania
 
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...Techsylvania
 
Jonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness ProductsJonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness ProductsTechsylvania
 
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI InnovationYossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI InnovationTechsylvania
 
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...Techsylvania
 
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...Techsylvania
 
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?Techsylvania
 
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...Techsylvania
 
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...Techsylvania
 
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1Techsylvania
 
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed TeamsPatrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed TeamsTechsylvania
 
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...Techsylvania
 
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...Techsylvania
 
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...Techsylvania
 
Julie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scaleJulie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scaleTechsylvania
 

Mehr von Techsylvania (20)

Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models UnlistedTom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
 
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
 
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
 
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCPAarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
 
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
 
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
 
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
 
Jonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness ProductsJonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness Products
 
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI InnovationYossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
 
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
 
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
 
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
 
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
 
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
 
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
 
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed TeamsPatrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
 
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
 
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
 
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
 
Julie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scaleJulie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scale
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy and the Edge

  • 1. June 10, 2019 / ricardo@samsungnext.com @ArgesRic https://mastodon.social/@ricardojmendez/ Identity, Privacy and the Edge Ricardo J. Méndez
  • 2. @argesric @samsungnext • Give a small taxonomy of useful labels and categories; • Walk you through what a layered conceptual model for identity could be like; • Talk about the privacy implications for how we go about implementing things; • Hopefully convince you that the closer to the edge we process things, the better it is for the user… • … but that the edge does not guarantee privacy. Goals!
  • 3. @argesric @samsungnext ●Justine Humenansky ●Ricardo J. Méndez ●Gus Warren ●David Crocker(BBW) ●WesleyDunnington (Ping Identity) ●JacobyThwaites (OnFido) ●PG, DJ, AL (*) Work in progress… Samsung NEXT Internet Identity Workshop XXVIII * Didn’t hear back about naming them. Privacy and GDPR, y’all!
  • 5. @argesric @samsungnext Identity is everything that defines you.
  • 6. @argesric @samsungnext Digital identity is what emerges from your online life.
  • 8. @argesric @samsungnext • Specific details about an individual. • Personally-identifying information, such as: • Your name… • Username/password pairs… • Shipping addresses… • Phone and passport numbers. • Facts are involved in verification and authentication. Facts
  • 9. @argesric @samsungnext ●Mailing address ●Username/password ●Phone number ●E-mail address ●Legal name ●Driver’s license ●Passport ●Income statements Two types of Facts Self-asserted Externally Validated CredentialsIdentifiers
  • 10. @argesric @samsungnext Which one depends on context.
  • 11. @argesric @samsungnext I am not a bundle of Facts.
  • 12. @argesric @samsungnext • Characteristics emerge from your daily activities, can be scried from the data exhaust: • Personal interests, tastes, habits; • What you avoid; • How you react to things; • Can change through the years; Characteristics are unstructured
  • 13. @argesric @samsungnext Characteristics can have value even divorced from Identifiers. That relates them to behavioral patterns and monetization.
  • 15. @argesric @samsungnext OSI Model https://en.w ikipedia.org/wiki/OSI_model
  • 16. @argesric @samsungnext Helps you answer: where does a new piece fit?
  • 17. @argesric @samsungnext Layer Name Description Examples 7 Application User- or system-levelflow sthat involve identities and other systems Sign-in account recovery, payment, w allet app on smartphone 6 Workflow Protocol flow s between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections fromother identities and systems Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs * WIP. Created during two sessions at the MV Internet Identity Workshop, May2019 7-Layer Conceptual Model of Identity*
  • 18. @argesric @samsungnext Layer Name Description Examples 7 Application User- or system-levelflow sthat involve identities and other systems Sign-in account recovery, payment, w allet app on smartphone 6 Workflow Protocol flow s between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections fromother identities and systems Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs 7-Layer Conceptual Model of Identity* * WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
  • 19. @argesric @samsungnext Layer Name Description Examples 7 Application User- or system-levelflow sthat involve identities and other systems Sign-in account recovery, payment, w allet app on smartphone 6 Workflow Protocol flow s between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections fromother identities and systems Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs 7-Layer Conceptual Model of Identity* * WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
  • 20. @argesric @samsungnext Layer Name Description Examples 7 Application User- or system-levelflow sthat involve identities and other systems Sign-in account recovery, payment, w allet app on smartphone 6 Workflow Protocol flow s between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections fromother identities and systems Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs 7-Layer Conceptual Model of Identity* * WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
  • 21. @argesric @samsungnext Layer Name Description Examples 7 Application User- or system-levelflow sthat involve identities and other systems Sign-in account recovery, payment, w allet app on smartphone 6 Workflow Protocol flow s between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections fromother identities and systems Evernym w allet connection w ith verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally foo@bar.com, did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust systemvalidates an identity ICANN, Bitcoin, PKI, self-signed certs 7-Layer Conceptual Model of Identity* * WIP. Created during two sessions at the MV Internet Identity Workshop, May2019
  • 22. @argesric @samsungnext Vocabulary helps you communicate. Communication is fundamental.
  • 23. System design and its impact on privacy
  • 28. @argesric @samsungnext • If you trust… • Their pinky-swear promise of not being evil; • They will properly implement controls so that no employees can abuse their power; • They are infallible engineers whose data will never leak; • Not like, say, people who keep passwords in cleartext… • … for over 14 years. * • Then that’s fine, I guess. Pinky-swear privacy involves trust * https://www.businessinsider.com/google-g-suite-passwords-stored-plaintext-2019-5
  • 29. @argesric @samsungnext Edge processing can be privacy-enhancing. It is not privacy-guaranteeing.
  • 30. @argesric @samsungnext • I am online usually in a specific time zone, • Which IP addresses my connections come from, • That I got served ads that skew towards movies and anime, • That I click on ads about cat food every 3-4 weeks, • That I never click on ads about nearby KFCs. Encryption != Privacy Five data points…
  • 31. @argesric @samsungnext You don’t even need someone’s identity facts, if you know all their characteristics.
  • 33. @argesric @samsungnext Facebook announced a $3-5Bn fine. Their valuation shot up by $40Bn. https://www.washingtonpost.com/technology/2019/04/24/facebook-sets-aside-billions-dollars-potential-ftc-fine/
  • 34. @argesric @samsungnext • Regulation and fines aren't going to get us out of this mess; • People won't leave because of scandals or screw-ups (or they'd have done it already); • People won't switch because your solution is more ethical - we already have those, and people don't use them. If you’re working on identity
  • 35. @argesric @samsungnext Give them a good reason. Enable them to do something they couldn’t do before.
  • 36. @argesric @samsungnext Identity is sticky. There’s a fear of impermanence.
  • 37. @argesric @samsungnext “Government must come to be the place where the most basic online identity will be grounded in the long term.” Jaron Lanier, Who Owns the Future?
  • 38. @argesric @samsungnext Users’ identity will always be subordinate to whomever controls the root.
  • 39. @argesric @samsungnext Online identity must be self- sovereign. Christopher Allen, The Path to Self-sovereign Identity https://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html
  • 40. @argesric @samsungnext This is not only a moral necessity. Self-sovereign identity will enable new interactions.
  • 41. @argesric @samsungnext Users must be in control of their data. We need to move it to the edge.
  • 42. The Edge needs a humanistic focus
  • 43. @argesric @samsungnext Think not only about where we process the data, but about who controls that node and its output.
  • 44. @argesric @samsungnext We are not talking about edge devices. We are talking about people. Control must lie with them.