Sometimes, you need a pragmatic solution. On the one hand, we’ve got purist techies who constantly question whether a security/identity approach is the best way forward, while on the other end of the spectrum there’s people using the same password (without two-factor authentication) for every app or service. For years, we’ve tried (and failed) to use PGP/GPG to encrypt and verify email transactions, meaning that trusted interactions are increasingly taking place in locations other than your inbox. When it comes to communication, we’ve got encrypted messengers, the best of which is widely regarded to be Signal from Open Whisper Systems. Hence Bitcoin and other cryptocurrencies. There’s no reason, for example, why someone should be able to track all of my purchases just because I’m participating in a digital transaction. Sometimes we want to be anonymous, or at least pseudo-anonymous. This helps situate the ‘other’ in terms of our networks, and people can inherit trust based on existing relationships and interactions. When we meet someone new, we look for points of overlapping interest, often based around human relationships. But what if I haven’t got any, or I’m unwilling to use it? (see the use case for CheapID) In those kinds of scenarios, you’re looking for multiple, lower-bar verification touchstones.Īs human beings, we do this all of the time. For example, if I show up at your door claiming to be Doug Belshaw, how can I prove that’s the case? The easiest thing to do would be to use government-issued identification such as my passport or driving license. #Keybase vs signal verification#Trust models change when verification is involved. That’s not to say I’m a believer in tying these things to real-world, offline identities. I’m going to stick my neck out a bit and say that, online, identity is the most important factor in any conversation or transaction.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |