<
https://theconversation.com/there-are-systems-guarding-your-data-in-cyberspace-but-who-is-guarding-the-guards-183041>
"We use internet-connected devices to access our bank accounts, keep our
transport systems moving, communicate with our colleagues, listen to music,
undertake commercially sensitive tasks – and order pizza. Digital security is
integral to our lives, every day.
And as our IT systems become more complex, the potential for vulnerabilities
increases. More and more organisations are being breached, leading to financial
loss, interrupted supply chains and identity fraud.
The current best practice in secure technology architecture used by major
businesses and organisations is a “zero trust” approach. In other words, no
person or system is trusted and every interaction is verified through a central
entity.
Unfortunately, absolute trust is then placed in the verification system being
used. So breaching this system gives an attacker the keys to the kingdom. To
address this issue, “decentralisation” is a new paradigm that removes any
single point of vulnerability.
Our work investigates and develops the algorithms required to set up an
effective decentralised verification system. We hope our efforts will help
safeguard digital identities, and bolster the security of the verification
processes so many of us rely on."
Cheers,
*** Xanni ***
--
mailto:xanni@xanadu.net Andrew Pam
http://xanadu.com.au/ Chief Scientist, Xanadu
https://glasswings.com.au/ Partner, Glass Wings
https://sericyb.com.au/ Manager, Serious Cybernetics