
You May Also Enjoy
Echoes from History II
This article, like “Echoes from History: Designing Self-Sovereign Identity with Care”, is drawn from a book I have in process called FOREMEMBRANCE, which c...
Echoes from History
This article was originally published as an advance reading for RWOT12 in Köln, Germany on August 9, 2023. It has been slightly edited for this reprint. ...
Musings of a Trust Architect: A Layperson’s Intro to Schnorr
ABSTRACT: Schnorr signatures have been a long time coming, but now that they’re finally here, they open up broad new cryptographic frontiers, including the i...
Musings of a Trust Architect: Least & Necessary Design Patterns
ABSTRACT: The principles of least privilege and least authority are core computer security principles that can minimize attacks. Not only can they be exte...