SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
TheWriteID	
  



A	
  hypothe/c	
  iden/ty	
  brokerage	
  service	
  
Digital	
  Iden/ty,	
  as	
  it	
  should	
  be.	
  
TheWriteID	
   is	
   a	
   work	
   in	
   progress,	
   both	
   as	
   a	
   technical	
   solu/on	
   and	
   as	
   a	
  
commercial	
  offer.	
  It	
  aims	
  to	
  be	
  the	
  iden%ty	
  layer	
  on	
  top	
  of	
  the	
  internet	
  with	
  
the	
  sole	
  and	
  only	
  goal	
  to	
  regain	
  control	
  over	
  one's	
  online	
  and	
  digital	
  iden%ty	
  
by	
  extrac/ng	
  it	
  from	
  current	
  networks	
  &	
  services.	
  	
  
	
  
The	
  best	
  part	
  of	
  TheWriteID	
  is	
  that	
  the	
  data	
  is	
  encrypted	
  locally	
  so	
  we	
  can't	
  
read	
  out	
  the	
  iden/ty	
  data	
  itself,	
  unless	
  a	
  user	
  decides	
  to	
  share	
  it.	
  We	
  aim	
  to	
  
make	
   true	
   iden%ty	
   manageable	
   and	
   re-­‐usable	
   for	
   other	
   networks	
   and	
  
services,	
  by	
  introducing	
  variable	
  personas.	
  	
  
	
  
In	
   essence,	
   we	
   wonder	
   how	
   we	
   can	
   evolve	
   from	
   an	
   internet	
   of	
   connected	
  
devices	
  to	
  a	
  truly	
  internet	
  of	
  connected	
  people?	
  TheWriteID	
  aims	
  to	
  get	
  us	
  
from	
   the	
   era	
   of	
   connected	
   contexts	
   to	
   one	
   where	
   users	
   are	
   free	
   to	
   handle	
  
their	
  iden/ty	
  and	
  all	
  its	
  slight	
  varia/ons	
  with	
  who	
  they	
  want/like/decide.	
  	
  
	
  	
  
Digital	
  iden/ty,	
  as	
  it	
  should	
  be:	
  www.TheWriteID.com.	
  	
  
From	
  here…	
  
To	
  here…	
  
TheWriteID	
  



iden/ty	
  brokerage	
  service	
  
TheWriteID	
  components.	
  
Don’t	
  trust	
  service	
  servers.	
  
As	
  the	
  user	
  cannot	
  trust	
  the	
  server	
  as	
  such,	
  we	
  envision	
  a	
  client-­‐side	
  
applica/on,	
  that	
  is	
  downloaded	
  and	
  running	
  in	
  the	
  browser.	
  We'd	
  
need	
  to	
  set	
  up	
  the	
  client-­‐side	
  applica/on	
  in	
  such	
  a	
  way	
  that	
  no	
  
further	
  server	
  calls	
  to	
  TWID	
  are	
  required.	
  	
  
	
  
Examples	
  of	
  such	
  applica/ons	
  already	
  exist,	
  as	
  prototypes	
  or	
  as	
  
proof-­‐of-­‐concepts:	
  	
  
	
  	
  
                    	
  Cappucino	
  framework	
  
                    	
  hMp://cappuccino.org/learn/demos/	
  
	
  	
  
                    	
  GitHubIssues	
  
                    	
  hMp://githubissues.heroku.com/	
  
	
  
Cappucino	
  comes	
  to	
  mind	
  as	
  a	
  framework	
  to	
  create	
  and	
  deliver	
  this	
  
client-­‐side	
  applica/on,	
  but	
  there	
  are	
  other	
  alterna/ves	
  as	
  well.	
  The	
  
idea	
  is	
  to	
  move	
  all	
  logic	
  and	
  handling	
  as	
  quickly	
  as	
  possible	
  to	
  the	
  
browser,	
  as	
  this	
  is	
  only	
  program	
  (to	
  a	
  degree)	
  that	
  can	
  be	
  trusted	
  by	
  
the	
  user.	
  
                    	
  	
  
                    	
  Background	
  on	
  Cappucino	
  
                    	
  
hMp://en.wikipedia.org/wiki/
Cappuccino_(applica/on_development_framework	
  
	
  
                    	
  A	
  possible	
  alterna/ve	
  to	
  Cappucino	
  
                    	
  hMp://sproutcore.com	
  
	
  
Another	
  approach	
  is	
  to	
  use	
  browser-­‐na/ve	
  applica/ons	
  that	
  can	
  be	
  
run	
  on	
  a	
  per-­‐browser	
  basis	
  –	
  browser	
  plugins,	
  XUL-­‐based	
  
applica/ons,	
  or	
  apps	
  available	
  through	
  AppStores.	
  
	
  	
  
                    	
  XUL	
  for	
  Mozilla	
  browsers	
  
                    	
  hMps://developer.mozilla.org/en/XUL	
  
	
  
                    	
  Extensions	
  for	
  Google	
  Chrome	
  browsers	
  
                    	
  hMps://chrome.google.com/webstore/category/extensions?hl=nl	
  	
  
                    	
  	
  
Depending	
  on	
  what	
  limits	
  we	
  encounter	
  in	
  a	
  proof-­‐of-­‐concept	
  
phase,	
  it	
  is	
  possible	
  that	
  certain	
  routes	
  might	
  not	
  be	
  op/mal	
  so	
  
choose	
  (browser	
  memory	
  limit,	
  processing	
  resources,	
  instancing,	
  
sandboxing,	
  …).	
  
	
  
Works	
  in	
  browser.	
  
We	
  have	
  a	
  limited,	
  not	
  maintained,	
  
proof-­‐of-­‐concept	
  available	
  by	
  simple	
  
request.	
  Mail	
  /mdeconinck	
  at	
  gmail	
  
for	
  access.	
  
	
  	
  
         	
  TheWriteID	
  Prototype	
  
         	
  hMp://writeid.sumocoders.be/ 	
  	
  
	
  
Encrypted	
  authen%ca%on.	
  
There	
  are	
  many	
  ways	
  to	
  authen/cate	
  yourself	
  towards	
  
the	
  applica/on.	
  We	
  can	
  select	
  PKI	
  or	
  key-­‐pair-­‐	
  
based	
  authen/ca/on	
  mechanisms.	
  A	
  lot	
  of	
  
implementa/ons	
  of	
  this	
  are	
  already	
  available.	
  	
  
Our	
  preference	
  goes	
  to	
  as	
  liMle	
  in-­‐between-­‐people	
  as	
  
possible,	
  so	
  key-­‐pairs	
  seems	
  the	
  way	
  to	
  go	
  here.	
  	
  
	
  	
  
Examples	
  are,	
  on	
  different	
  levels	
  of	
  implementa/on	
  
and	
  for	
  different	
  use-­‐cases:	
  	
  
	
  	
  
              	
  Belgium	
  eID	
  
              	
  hMp://eid.belgium.be/nl/	
  
              	
  Implementa/on	
  of	
  TaxOnWeb	
  with	
  	
  
              	
  
hMps://eservices.minfin.fgov.be/portal/nl/public/
ci/zen/welcome	
  
	
  
              	
  TrueCrypt	
  
              	
  hMp://www.truecrypt.org/	
  
              	
  	
  
              	
  OpenPGP	
  
              	
  
hMp://en.wikipedia.org/wiki/
PreMy_Good_Privacy#OpenPGP	
  
              	
  GPG	
  
              	
  hMp://en.wikipedia.org/wiki/GNU_Privacy_Guard	
  	
  	
  
              	
  General	
  background	
  about	
  public-­‐key	
  cryptography	
  
              	
  
hMp://en.wikipedia.org/wiki/Public-­‐key_cryptography	
  
	
  
Remote	
  storage.	
  
We	
  envision	
  RemoteStorage	
  to	
  be	
  the	
  storage	
  
protocol	
  of	
  choice,	
  as	
  this	
  allows	
  for	
  distribu/on	
  of	
  the	
  
data	
  accessed	
  acer	
  usage.	
  We	
  also	
  see	
  
RemoteStorage	
  as	
  a	
  way	
  of	
  spreading	
  risk,	
  and	
  see	
  it	
  
as	
  a	
  way	
  of	
  coping	
  with	
  the	
  limita/ons	
  of	
  the	
  client-­‐
side	
  applica/on	
  within	
  the	
  browser.	
  	
  
	
  	
  
RemoteStorage	
  providers	
  can	
  be	
  both	
  trusted	
  and	
  
non-­‐trusted,	
  in	
  the	
  sense	
  that	
  we	
  might	
  use	
  specific	
  
features	
  of	
  a	
  provider,	
  or	
  choose	
  not	
  to	
  implement	
  
these.	
  	
  
	
  	
  
We	
  at	
  least	
  want	
  to	
  provide	
  the	
  op/on	
  to	
  the	
  TWID	
  
user	
  to	
  encrypt	
  the	
  data	
  being	
  stored	
  remotely.	
  That	
  
way,	
  only	
  the	
  user	
  can	
  unlock	
  the	
  content	
  to	
  be	
  
managed	
  –	
  making	
  it	
  secure	
  from	
  man-­‐in-­‐the-­‐middle	
  
aMacks	
  and	
  remote	
  snooping	
  on	
  the	
  server.	
  Before	
  the	
  
remote	
  storage	
  is	
  being	
  used	
  again,	
  the	
  client-­‐side	
  
applica/on	
  encrypts	
  everything	
  again	
  before	
  shudng	
  
down.	
  
	
  	
  
               	
  Remote	
  Storage	
  protocol	
  
               	
  
hMp://www.w3.org/community/unhosted/wiki/
RemoteStorage	
  
	
  	
  
               	
  Unhosted	
  
               	
  hMp://unhosted.org/#remotestorage	
  
	
  	
  
However,	
  we	
  don't	
  see	
  any	
  problem	
  to	
  also	
  store	
  data	
  
on	
  untrusted	
  remote	
  storage	
  providers,	
  like	
  Dropbox,	
  
Google	
  Docs,	
  Amazon	
  S3,	
  WeTransfer,	
  etc.	
  
	
  
Decrypted	
  authen%ca%on.	
  
When	
  the	
  remote	
  storage	
  yields	
  the	
  
dataset	
  that	
  has	
  been	
  encrypted	
  
earlier,	
  the	
  client-­‐side	
  applica/on	
  
needs	
  to	
  decrypt	
  everything	
  before	
  it	
  
can	
  be	
  accessed.	
  There	
  are	
  mul/ple	
  
ways	
  of	
  doing	
  this,	
  and	
  based	
  on	
  the	
  
encryp/on	
  defined	
  earlier,	
  it	
  is	
  
necessary	
  custom	
  crypto	
  development	
  
will	
  have	
  to	
  take	
  place.	
  	
  
On	
  the	
  other	
  hand,	
  the	
  proof-­‐of-­‐
concept	
  has	
  been	
  made	
  already	
  with	
  
the	
  Stanford	
  JS	
  Crypto	
  Library	
  
men/oned	
  below.	
  
	
  	
  
         	
  Stanford	
  JS	
  Crypto	
  Library	
  
         	
  hMp://crypto.stanford.edu/sjcl/	
  
	
  	
  
	
  
It’s	
  simple.	
  
TheWriteID	
  ra%onale.	
  
The	
  iden%ty	
  API	
  exchange.	
  
The	
  TWID	
  client-­‐side	
  applica/on	
  can	
  
talk	
  to	
  prac/cally	
  any	
  service	
  offering	
  
an	
  interface	
  for	
  data	
  exchange,	
  and	
  
this	
  in	
  both	
  direc/ons.	
  We	
  can	
  import	
  
data	
  from	
  accounts	
  that	
  TWID	
  gets	
  
access	
  too.	
  And	
  the	
  client-­‐side	
  
applica/on	
  can	
  push	
  data	
  to	
  networks	
  
the	
  TWID	
  account	
  can	
  connect	
  too.	
  
	
  	
  
Authen/ca/on	
  will	
  be	
  needed	
  for	
  
every	
  /me	
  a	
  connec/on	
  is	
  made	
  in	
  
both	
  direc/ons,	
  which	
  is	
  where	
  Oauth	
  
comes	
  in	
  for	
  the	
  authen/ca/on	
  from	
  
client-­‐side	
  applica/on	
  to	
  each	
  network	
  
or	
  external	
  service.	
  
          	
  	
  
          	
  Open	
  Authen/ca/on	
  
          	
  hMp://oauth.net/	
  
	
  
	
  
End	
  note.	
  	
  
Many	
  thanks	
  to…	
  
	
  
Frank	
  Guthorel	
  –	
  Code	
  d’Or	
  
Tijs	
  Verkoyen	
  –	
  Sumocoders	
  
Jan	
  De	
  Poorter	
  –	
  Sumocoders	
  	
  
Sebas/an	
  Hagens	
  –	
  Sebas/x	
  
Kaliya	
  –	
  Iden/ty	
  woman	
  
Peter	
  Van	
  der	
  Auwere	
  -­‐	
  SWIFT	
  	
  
Elias	
  Bizannes	
  –	
  Startupbus	
  
Kenneth	
  De	
  Buck	
  –	
  Bold	
  Graphics	
  
Florian	
  Brondel	
  
S/jn	
  Van	
  Herck	
  
	
  
And	
  many	
  more	
  who	
  gave	
  us	
  
feedback,	
  /ps,	
  support	
  and	
  their	
  love.	
  
	
                                                                         You	
  could	
  not	
  do	
  any	
  of	
  us	
  a	
  bigger	
  favor	
  	
  
	
                                                                        than	
  to	
  make	
  TheWriteID	
  happen	
  acer	
  all.	
  
	
                                                                       hMp://www,.thewriteid.com	
  |	
  @TheWriteID	
  
                  Tim	
  De	
  Coninck	
  –	
  A	
  cup	
  of	
  T	
  
	
  

Mais conteúdo relacionado

Destaque

Social media agile marketing
Social media agile marketingSocial media agile marketing
Social media agile marketingElodie Mariette
 
Large Scale Capacity Development in eHealth - WHO, Geneva, Sept 2010
Large Scale Capacity Development in eHealth - WHO, Geneva, Sept 2010Large Scale Capacity Development in eHealth - WHO, Geneva, Sept 2010
Large Scale Capacity Development in eHealth - WHO, Geneva, Sept 2010Arletty Pinel
 
GOSPL: A Method and Tool for Fact-Oriented Hybrid Ontology Engineering
GOSPL: A Method and Tool for Fact-Oriented Hybrid Ontology EngineeringGOSPL: A Method and Tool for Fact-Oriented Hybrid Ontology Engineering
GOSPL: A Method and Tool for Fact-Oriented Hybrid Ontology EngineeringChristophe Debruyne
 
Delltares statement of capabilities water & energy 2010
Delltares statement of capabilities water & energy 2010Delltares statement of capabilities water & energy 2010
Delltares statement of capabilities water & energy 2010Marcel Bruggers
 
Choosing a good company name
Choosing a good company nameChoosing a good company name
Choosing a good company nameRed Zezel
 
Energie Uit Water Hype Of Kans
Energie Uit Water   Hype Of KansEnergie Uit Water   Hype Of Kans
Energie Uit Water Hype Of KansMarcel Bruggers
 
LezingNieuwland_jan2011_Marco Heijligers
LezingNieuwland_jan2011_Marco HeijligersLezingNieuwland_jan2011_Marco Heijligers
LezingNieuwland_jan2011_Marco HeijligersVU Connected
 
Reducing rx abuse_at_the_community_level
Reducing rx abuse_at_the_community_levelReducing rx abuse_at_the_community_level
Reducing rx abuse_at_the_community_levelOPUNITE
 
Filosofia limbajului - curs 10
Filosofia limbajului - curs 10Filosofia limbajului - curs 10
Filosofia limbajului - curs 10Gramo S World
 

Destaque (10)

Social media agile marketing
Social media agile marketingSocial media agile marketing
Social media agile marketing
 
Large Scale Capacity Development in eHealth - WHO, Geneva, Sept 2010
Large Scale Capacity Development in eHealth - WHO, Geneva, Sept 2010Large Scale Capacity Development in eHealth - WHO, Geneva, Sept 2010
Large Scale Capacity Development in eHealth - WHO, Geneva, Sept 2010
 
GOSPL: A Method and Tool for Fact-Oriented Hybrid Ontology Engineering
GOSPL: A Method and Tool for Fact-Oriented Hybrid Ontology EngineeringGOSPL: A Method and Tool for Fact-Oriented Hybrid Ontology Engineering
GOSPL: A Method and Tool for Fact-Oriented Hybrid Ontology Engineering
 
Delltares statement of capabilities water & energy 2010
Delltares statement of capabilities water & energy 2010Delltares statement of capabilities water & energy 2010
Delltares statement of capabilities water & energy 2010
 
Choosing a good company name
Choosing a good company nameChoosing a good company name
Choosing a good company name
 
Energie Uit Water Hype Of Kans
Energie Uit Water   Hype Of KansEnergie Uit Water   Hype Of Kans
Energie Uit Water Hype Of Kans
 
LezingNieuwland_jan2011_Marco Heijligers
LezingNieuwland_jan2011_Marco HeijligersLezingNieuwland_jan2011_Marco Heijligers
LezingNieuwland_jan2011_Marco Heijligers
 
Reducing rx abuse_at_the_community_level
Reducing rx abuse_at_the_community_levelReducing rx abuse_at_the_community_level
Reducing rx abuse_at_the_community_level
 
Filosofia limbajului - curs 10
Filosofia limbajului - curs 10Filosofia limbajului - curs 10
Filosofia limbajului - curs 10
 
2.2 abex new1
2.2 abex new12.2 abex new1
2.2 abex new1
 

Semelhante a Digital Identity Brokerage Service Manages Encrypted Data Locally

Cloud-Based Virtual World Platforms
Cloud-Based Virtual World PlatformsCloud-Based Virtual World Platforms
Cloud-Based Virtual World PlatformsEric Hackathorn
 
Crypto wallet app - Google Docs.pdf
Crypto wallet app - Google Docs.pdfCrypto wallet app - Google Docs.pdf
Crypto wallet app - Google Docs.pdfharikacheluru
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
Identiverse - Microservices Security
Identiverse - Microservices SecurityIdentiverse - Microservices Security
Identiverse - Microservices SecurityBertrand Carlier
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
Decentralized Applications (dApps)_ Examples, Advantages, and Disadvantages.
Decentralized Applications (dApps)_ Examples, Advantages, and Disadvantages.Decentralized Applications (dApps)_ Examples, Advantages, and Disadvantages.
Decentralized Applications (dApps)_ Examples, Advantages, and Disadvantages.stepheniepeterson
 
PyConWeb - 2019 Auditing websites & apps for privacy leaks.
PyConWeb - 2019 Auditing websites & apps for privacy leaks.PyConWeb - 2019 Auditing websites & apps for privacy leaks.
PyConWeb - 2019 Auditing websites & apps for privacy leaks.Konark modi
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Priyanka Aash
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 
1. Part 1) Choose your own topic related to web technologiesappl.docx
1. Part 1)  Choose your own topic related to web technologiesappl.docx1. Part 1)  Choose your own topic related to web technologiesappl.docx
1. Part 1) Choose your own topic related to web technologiesappl.docxjackiewalcutt
 
WebRTC And FreeSWITCH – What This Combination Means?
WebRTC And FreeSWITCH – What This Combination Means?WebRTC And FreeSWITCH – What This Combination Means?
WebRTC And FreeSWITCH – What This Combination Means?MoonTechnolabsPvtLtd
 
Cloud computing secrets
Cloud computing secretsCloud computing secrets
Cloud computing secretsFlora Runyenje
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3Gurpreet singh
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
Developing Secure Web Apps
Developing Secure Web AppsDeveloping Secure Web Apps
Developing Secure Web AppsMark Garratt
 

Semelhante a Digital Identity Brokerage Service Manages Encrypted Data Locally (20)

A presentation on cloud computing
A presentation on cloud computingA presentation on cloud computing
A presentation on cloud computing
 
A presentation on cloud computing
A presentation on cloud computingA presentation on cloud computing
A presentation on cloud computing
 
Cloud-Based Virtual World Platforms
Cloud-Based Virtual World PlatformsCloud-Based Virtual World Platforms
Cloud-Based Virtual World Platforms
 
Crypto wallet app - Google Docs.pdf
Crypto wallet app - Google Docs.pdfCrypto wallet app - Google Docs.pdf
Crypto wallet app - Google Docs.pdf
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Identiverse - Microservices Security
Identiverse - Microservices SecurityIdentiverse - Microservices Security
Identiverse - Microservices Security
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Decentralized Applications (dApps)_ Examples, Advantages, and Disadvantages.
Decentralized Applications (dApps)_ Examples, Advantages, and Disadvantages.Decentralized Applications (dApps)_ Examples, Advantages, and Disadvantages.
Decentralized Applications (dApps)_ Examples, Advantages, and Disadvantages.
 
PyConWeb - 2019 Auditing websites & apps for privacy leaks.
PyConWeb - 2019 Auditing websites & apps for privacy leaks.PyConWeb - 2019 Auditing websites & apps for privacy leaks.
PyConWeb - 2019 Auditing websites & apps for privacy leaks.
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410
 
1. Part 1) Choose your own topic related to web technologiesappl.docx
1. Part 1)  Choose your own topic related to web technologiesappl.docx1. Part 1)  Choose your own topic related to web technologiesappl.docx
1. Part 1) Choose your own topic related to web technologiesappl.docx
 
WebRTC And FreeSWITCH – What This Combination Means?
WebRTC And FreeSWITCH – What This Combination Means?WebRTC And FreeSWITCH – What This Combination Means?
WebRTC And FreeSWITCH – What This Combination Means?
 
Cloud computing secrets
Cloud computing secretsCloud computing secrets
Cloud computing secrets
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
Developing Secure Web Apps
Developing Secure Web AppsDeveloping Secure Web Apps
Developing Secure Web Apps
 

Último

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 

Último (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 

Digital Identity Brokerage Service Manages Encrypted Data Locally

  • 1. TheWriteID   A  hypothe/c  iden/ty  brokerage  service  
  • 2. Digital  Iden/ty,  as  it  should  be.   TheWriteID   is   a   work   in   progress,   both   as   a   technical   solu/on   and   as   a   commercial  offer.  It  aims  to  be  the  iden%ty  layer  on  top  of  the  internet  with   the  sole  and  only  goal  to  regain  control  over  one's  online  and  digital  iden%ty   by  extrac/ng  it  from  current  networks  &  services.       The  best  part  of  TheWriteID  is  that  the  data  is  encrypted  locally  so  we  can't   read  out  the  iden/ty  data  itself,  unless  a  user  decides  to  share  it.  We  aim  to   make   true   iden%ty   manageable   and   re-­‐usable   for   other   networks   and   services,  by  introducing  variable  personas.       In   essence,   we   wonder   how   we   can   evolve   from   an   internet   of   connected   devices  to  a  truly  internet  of  connected  people?  TheWriteID  aims  to  get  us   from   the   era   of   connected   contexts   to   one   where   users   are   free   to   handle   their  iden/ty  and  all  its  slight  varia/ons  with  who  they  want/like/decide.         Digital  iden/ty,  as  it  should  be:  www.TheWriteID.com.    
  • 7. Don’t  trust  service  servers.   As  the  user  cannot  trust  the  server  as  such,  we  envision  a  client-­‐side   applica/on,  that  is  downloaded  and  running  in  the  browser.  We'd   need  to  set  up  the  client-­‐side  applica/on  in  such  a  way  that  no   further  server  calls  to  TWID  are  required.       Examples  of  such  applica/ons  already  exist,  as  prototypes  or  as   proof-­‐of-­‐concepts:          Cappucino  framework    hMp://cappuccino.org/learn/demos/        GitHubIssues    hMp://githubissues.heroku.com/     Cappucino  comes  to  mind  as  a  framework  to  create  and  deliver  this   client-­‐side  applica/on,  but  there  are  other  alterna/ves  as  well.  The   idea  is  to  move  all  logic  and  handling  as  quickly  as  possible  to  the   browser,  as  this  is  only  program  (to  a  degree)  that  can  be  trusted  by   the  user.        Background  on  Cappucino     hMp://en.wikipedia.org/wiki/ Cappuccino_(applica/on_development_framework      A  possible  alterna/ve  to  Cappucino    hMp://sproutcore.com     Another  approach  is  to  use  browser-­‐na/ve  applica/ons  that  can  be   run  on  a  per-­‐browser  basis  –  browser  plugins,  XUL-­‐based   applica/ons,  or  apps  available  through  AppStores.        XUL  for  Mozilla  browsers    hMps://developer.mozilla.org/en/XUL      Extensions  for  Google  Chrome  browsers    hMps://chrome.google.com/webstore/category/extensions?hl=nl         Depending  on  what  limits  we  encounter  in  a  proof-­‐of-­‐concept   phase,  it  is  possible  that  certain  routes  might  not  be  op/mal  so   choose  (browser  memory  limit,  processing  resources,  instancing,   sandboxing,  …).    
  • 8. Works  in  browser.   We  have  a  limited,  not  maintained,   proof-­‐of-­‐concept  available  by  simple   request.  Mail  /mdeconinck  at  gmail   for  access.        TheWriteID  Prototype    hMp://writeid.sumocoders.be/      
  • 9. Encrypted  authen%ca%on.   There  are  many  ways  to  authen/cate  yourself  towards   the  applica/on.  We  can  select  PKI  or  key-­‐pair-­‐   based  authen/ca/on  mechanisms.  A  lot  of   implementa/ons  of  this  are  already  available.     Our  preference  goes  to  as  liMle  in-­‐between-­‐people  as   possible,  so  key-­‐pairs  seems  the  way  to  go  here.         Examples  are,  on  different  levels  of  implementa/on   and  for  different  use-­‐cases:          Belgium  eID    hMp://eid.belgium.be/nl/    Implementa/on  of  TaxOnWeb  with       hMps://eservices.minfin.fgov.be/portal/nl/public/ ci/zen/welcome      TrueCrypt    hMp://www.truecrypt.org/        OpenPGP     hMp://en.wikipedia.org/wiki/ PreMy_Good_Privacy#OpenPGP    GPG    hMp://en.wikipedia.org/wiki/GNU_Privacy_Guard        General  background  about  public-­‐key  cryptography     hMp://en.wikipedia.org/wiki/Public-­‐key_cryptography    
  • 10. Remote  storage.   We  envision  RemoteStorage  to  be  the  storage   protocol  of  choice,  as  this  allows  for  distribu/on  of  the   data  accessed  acer  usage.  We  also  see   RemoteStorage  as  a  way  of  spreading  risk,  and  see  it   as  a  way  of  coping  with  the  limita/ons  of  the  client-­‐ side  applica/on  within  the  browser.         RemoteStorage  providers  can  be  both  trusted  and   non-­‐trusted,  in  the  sense  that  we  might  use  specific   features  of  a  provider,  or  choose  not  to  implement   these.         We  at  least  want  to  provide  the  op/on  to  the  TWID   user  to  encrypt  the  data  being  stored  remotely.  That   way,  only  the  user  can  unlock  the  content  to  be   managed  –  making  it  secure  from  man-­‐in-­‐the-­‐middle   aMacks  and  remote  snooping  on  the  server.  Before  the   remote  storage  is  being  used  again,  the  client-­‐side   applica/on  encrypts  everything  again  before  shudng   down.        Remote  Storage  protocol     hMp://www.w3.org/community/unhosted/wiki/ RemoteStorage        Unhosted    hMp://unhosted.org/#remotestorage       However,  we  don't  see  any  problem  to  also  store  data   on  untrusted  remote  storage  providers,  like  Dropbox,   Google  Docs,  Amazon  S3,  WeTransfer,  etc.    
  • 11. Decrypted  authen%ca%on.   When  the  remote  storage  yields  the   dataset  that  has  been  encrypted   earlier,  the  client-­‐side  applica/on   needs  to  decrypt  everything  before  it   can  be  accessed.  There  are  mul/ple   ways  of  doing  this,  and  based  on  the   encryp/on  defined  earlier,  it  is   necessary  custom  crypto  development   will  have  to  take  place.     On  the  other  hand,  the  proof-­‐of-­‐ concept  has  been  made  already  with   the  Stanford  JS  Crypto  Library   men/oned  below.        Stanford  JS  Crypto  Library    hMp://crypto.stanford.edu/sjcl/        
  • 14. The  iden%ty  API  exchange.   The  TWID  client-­‐side  applica/on  can   talk  to  prac/cally  any  service  offering   an  interface  for  data  exchange,  and   this  in  both  direc/ons.  We  can  import   data  from  accounts  that  TWID  gets   access  too.  And  the  client-­‐side   applica/on  can  push  data  to  networks   the  TWID  account  can  connect  too.       Authen/ca/on  will  be  needed  for   every  /me  a  connec/on  is  made  in   both  direc/ons,  which  is  where  Oauth   comes  in  for  the  authen/ca/on  from   client-­‐side  applica/on  to  each  network   or  external  service.        Open  Authen/ca/on    hMp://oauth.net/      
  • 15. End  note.     Many  thanks  to…     Frank  Guthorel  –  Code  d’Or   Tijs  Verkoyen  –  Sumocoders   Jan  De  Poorter  –  Sumocoders     Sebas/an  Hagens  –  Sebas/x   Kaliya  –  Iden/ty  woman   Peter  Van  der  Auwere  -­‐  SWIFT     Elias  Bizannes  –  Startupbus   Kenneth  De  Buck  –  Bold  Graphics   Florian  Brondel   S/jn  Van  Herck     And  many  more  who  gave  us   feedback,  /ps,  support  and  their  love.     You  could  not  do  any  of  us  a  bigger  favor       than  to  make  TheWriteID  happen  acer  all.     hMp://www,.thewriteid.com  |  @TheWriteID   Tim  De  Coninck  –  A  cup  of  T