About Security: Difference between revisions
No edit summary |
No edit summary |
||
Line 13: | Line 13: | ||
<blockquote> | <blockquote> | ||
The encryption mechanisms above are augmented by bank verification. All entitled users are either identified real persons or group or corporate constructs who are mapped to real persons by virtue of their traceability thru the international financial system. | The encryption mechanisms above are augmented by bank verification. All entitled users are either identified real persons or group or corporate constructs who are mapped to real persons by virtue of their traceability thru the international financial system. | ||
</blockquote> | |||
<a href=http://pgp.mit.edu/>pgp.mit.edu</a> | |||
<blockquote> | |||
There are two keys there under "Juan Daugherty" on 2011-08-12, both me but I don't remember the secret for the older one. | |||
</blockquote> | </blockquote> | ||
</html> | </html> |
Revision as of 16:06, 12 August 2011
In Communications ...
In Identity Authentication ... pgp.mit.edu See also: |
|
¹
For transparent and easiest use of our secure server you must install the certificate sent when you register. This also provides the highest level of security for your activities here. Without this certificate installed, you will get a scary notice from your browser about our claiming to be us with which you may also be familiar.
If you do not use the certificate, you will have to log or sign in to a log-in point. Our domain management software will then manage your log-ins to integral spaces but you may continue to get notifications from your browser if the certificate is not installed. Note that you install certificates in browsers, not operating systems, and not all browsers have faciliities to accept certificates.
²
In addition to above, and for the same reasons, use of an authentication agent (pageant, ssh-agent).