There has been a fair amount of effort on UCAN (User Controlled Authorization Networks), and other types of ‘decentralized credentials’ over the last couple years. These efforts perpetuate the same control structures that exist today, with delegated trees of hierarchical control. This is in contrast to a personal or ‘decentralized’ trust we might hope for… Continue reading On Trust
Category: Privacy
Private Retrieval
It’s very exciting to have a public face to the thoughts around how to enable effective private access to data. Research Announcement The basic hypothesis here is that there’s a high-leverage opportunity to attract thought around scaling the range of anonymous database or data transfer techniques to reach something with better properties that the systems… Continue reading Private Retrieval
What's Left for private Messaging
I had the privilege to address the annual Chaos Communication Congress (36C3) in Leipzig last week about the state and remaining issues in private communications. The recording of the video has been made available by the CCC, and I have also posted the slides. The TL;DR for me is that many of the trade-offs are… Continue reading What's Left for private Messaging
Messaging Threat models
I talked yesterday at Bornhack about the current state of secure messaging and the different primitives and threats that groups are working to address. The talk is on youtube. The slides are on this site, as are the directions for dogfooding the talek system.
Privacy issues for City Wi-Fi Deployments
At the end of last month, Seattle posted a request for information exploring the feasibility of a municipal Wireless deployment. With others at the Seattle Privacy Coalition, I draft a response to the city flagging some of the major privacy issues that we hope they will consider in the initiative. I believe these are much… Continue reading Privacy issues for City Wi-Fi Deployments