About Security: Difference between revisions
No edit summary |
No edit summary |
||
(3 intermediate revisions by the same user not shown) | |||
Line 9: | Line 9: | ||
In Communications ... | In Communications ... | ||
<blockquote align=justify> | <blockquote align=justify> | ||
You are probably already familiar by now with the two common means of authenication and privacy over the internet: logging in with a password and user id known only to you and the party you are communicating with and the use of secure connections | You are probably already familiar by now with the two common means of authenication and privacy over the internet: logging in with a password and user id known only to you and the party you are communicating with and the use of secure connections signaled usually by indicators on the location bar of your browser. | ||
<br><br> | <br><br> | ||
In any case, the URI should show https not http though some browsers may have scary indicators or intermediate pages to accompany their scary indicators. The important distinction is between https amd http indicating an encrypted connection. The encryption is the same, it is simply that the browser doesn't trust the certificate, but it usually will permit use once you OK the exception. | |||
In any case, the | |||
<br><br> | <br><br> | ||
</blockquote> | </blockquote> | ||
Line 19: | Line 17: | ||
<blockquote> | <blockquote> | ||
The encryption mechanisms above are augmented by bank verification. All entitled users are either identified real persons or group or corporate constructs who are mapped to real persons by virtue of their traceability thru the international financial system. | The encryption mechanisms above are augmented by bank verification. All entitled users are either identified real persons or group or corporate constructs who are mapped to real persons by virtue of their traceability thru the international financial system. | ||
</blockquote> | |||
In some DevOps contexts ... | |||
<blockquote> | |||
Security measures applied generally for AKPERSONs will suffice for DevOps users as far as DS contexts are concerned. However it's not uncommon for third parties to require certs for | |||
various development and production purposes, so you may need to provide one or use one provided by them. We don't at this time act as a CA. | |||
<br><br> | |||
</blockquote> | </blockquote> | ||
<a href=http://pgp.mit.edu/>pgp.mit.edu</a> | <a href=http://pgp.mit.edu/>pgp.mit.edu</a> | ||
Line 34: | Line 38: | ||
<td> | <td> | ||
<div align=right> | <div align=right> | ||
<img src=https://meansofproduction.biz/images/qthush.gif> | <img title="Q.T., Quincy, and Shamus" src=https://meansofproduction.biz/images/qthush.gif> | ||
</div> | </div> | ||
</td> | </td> | ||
</tr></table> | </tr></table> | ||
<hr> | <hr> | ||
</blockquote> | </blockquote> | ||
</font> | </font> | ||
</html> | </html> |
Latest revision as of 20:47, 26 March 2024
In Domain Spaces ...
In Communications ... In Identity Authentication ... In some DevOps contexts ... pgp.mit.edu See also: |
|