×
Copy
Open
Link
Embed
Share
Beginning
This slide
Copy link URL
Copy link URL
Copy iframe embed code
Copy iframe embed code
Copy javascript embed code
Copy javascript embed code
Share
Tweet
Share
Tweet
Slide 1
Slide 1 text
The problem with Authority BUREAUCRACY, CORPORATE INFLUENCE & TRUST Thursday, September 26, 13
Slide 2
Slide 2 text
massive amounts of software & data We create Thursday, September 26, 13
Slide 3
Slide 3 text
& widely distributed We want it to be highly available Thursday, September 26, 13
Slide 4
Slide 4 text
the authenticity & origin of things We want to validate Thursday, September 26, 13
Slide 5
Slide 5 text
Today we have A BUREAUCRACY & A TECHNICAL QUANDARY Thursday, September 26, 13
Slide 6
Slide 6 text
We can’t solve problems with the same level of thinking that created them. “ A Nice Quote from some smart person Thursday, September 26, 13
Slide 7
Slide 7 text
Reputation Systems PKI, SPKI, SDSI... Thursday, September 26, 13
Slide 8
Slide 8 text
Try to define identity Thursday, September 26, 13
Slide 9
Slide 9 text
Try to replicate identity Thursday, September 26, 13
Slide 10
Slide 10 text
␡ Try to revoke identity Thursday, September 26, 13
Slide 11
Slide 11 text
✓ Try to define policies Thursday, September 26, 13
Slide 12
Slide 12 text
Sybil attacks Revocation lists Replication Latency Financial Concerns Problems in reputation systems ␡ Thursday, September 26, 13
Slide 13
Slide 13 text
How should we define Identity? WITHOUT CENTRALIZED AUTHORITY Thursday, September 26, 13
Slide 14
Slide 14 text
Social networks define identity as behaviors & interactions over time Thursday, September 26, 13
Slide 15
Slide 15 text
public & private key cryptography Simple tools for Thursday, September 26, 13
Slide 16
Slide 16 text
data & software to actual authors Let’s start mapping Thursday, September 26, 13
Slide 17
Slide 17 text
github.com/hij1nx/pkp Thursday, September 26, 13
Slide 18
Slide 18 text
hash (data) public key URLs cert = sign(private key, meta) meta { Thursday, September 26, 13
Slide 19
Slide 19 text
hash(data) = cert.hash + verify(public key, cert) Thursday, September 26, 13
Slide 20
Slide 20 text
Twitter Thursday, September 26, 13
Slide 21
Slide 21 text
/ hij1nx ! " fin Thursday, September 26, 13