Thanks for the response! I'm glad you have similar interests in this.
I have some responses inline:
On Sat, Dec 8, 2012 at 11:45 PM, elijah wrote:
> If I read correctly, a few of your main points are:
>
> (1) We need well defined and expanded trust metrics
> (2) Everything would be better if we
On Tue, Dec 4, 2012 at 5:29 AM, Melvin Carvalho
wrote:
>
> Not sure I've grokked everything in this thread, but some thoughts.
>
I'm working on the TL;DR version :).
> Tying a key to a 'domain' (aka URI) is something that can be done already
> using linked data.
>
> I do so on my home page alread
Yup, Sovereign Keys is awesome. I hadn't looked it up since thinking
more about the importance of having a single mapping but on a quick
re-read I understand it as follows:
Sovereign keys has a very strict requirement for changing this mapping
as domain names should. ie. Only a key revocation can
lop some sort of community consensus around best
practices for authentication infrastructure and some of this is research that
still needs exploring, thinking, and results.
I am a new grad student at UCSB and interned for the Guardian Project this past
summer. I have been interested in authenticatio