About Security: Difference between revisions

From Cibernética Americana
Jump to navigationJump to search
No edit summary
 
No edit summary
(3 intermediate revisions by the same user not shown)
Line 13: Line 13:
<blockquote>
<blockquote>
  The encryption mechanisms above are augmented by bank verification. All entitled users are either identified real persons or group or corporate constructs who are mapped to real persons by virtue of their traceability thru the international financial system.
  The encryption mechanisms above are augmented by bank verification. All entitled users are either identified real persons or group or corporate constructs who are mapped to real persons by virtue of their traceability thru the international financial system.
</blockquote>
<a href=http://pgp.mit.edu/>pgp.mit.edu</a>
<blockquote>
There are two keys there under "Juan Daugherty" on 2011-08-12, both me but I don't remember the secret for the older one.
</blockquote>
</blockquote>
</html>
</html>
Line 24: Line 28:
<td>
<td>
<div align=right>
<div align=right>
<img src=http://commoditysoftware.org/images/qthush.gif>
<img src=https://meansofproduction.biz/images/qthush.gif>
</div>
</div>
</td>
</td>

Revision as of 04:49, 1 October 2019

In Communications ...

You are probably already familiar by now with the two common means of authenication and privacy over the internet: logging in with a password and user id known only to you and the party you are communicating with and the use of secure connections signalled usually by a lock icon on the status bar of your browser¹.

Additional measures² may in the future be required for some uses.

In any case, the lock icon should show as locked though some browsers may draw a line through the lock or the like to accompany their scary pop-ups. The important distinction is between the lock in the open state indicating an unencrypted connection and the locked state indicating a secure (encrypted) one.

In Identity Authentication ...

The encryption mechanisms above are augmented by bank verification. All entitled users are either identified real persons or group or corporate constructs who are mapped to real persons by virtue of their traceability thru the international financial system.

pgp.mit.edu

There are two keys there under "Juan Daugherty" on 2011-08-12, both me but I don't remember the secret for the older one.

See also:


¹

For transparent and easiest use of our secure server you must install the certificate sent when you register. This also provides the highest level of security for your activities here. Without this certificate installed, you will get a scary notice from your browser about our claiming to be us with which you may also be familiar.

If you do not use the certificate, you will have to log or sign in to a log-in point. Our domain management software will then manage your log-ins to integral spaces but you may continue to get notifications from your browser if the certificate is not installed. Note that you install certificates in browsers, not operating systems, and not all browsers have faciliities to accept certificates.

²

In addition to above, and for the same reasons, use of an authentication agent (pageant, ssh-agent).