TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CONIKS – Bringing Key Transparency to End Users (2014) [pdf]

16 pointsby spaceboyover 8 years ago

2 comments

CaliforniaKarlover 8 years ago
Joseph Bonneau, one of the paper&#x27;s authors, talked about this in the Stanford Computer (course EE380) during Autumn quarter.<p>The talk&#x27;s abstract: <a href="http:&#x2F;&#x2F;ee380.stanford.edu&#x2F;Abstracts&#x2F;161130.html" rel="nofollow">http:&#x2F;&#x2F;ee380.stanford.edu&#x2F;Abstracts&#x2F;161130.html</a><p>A video: <a href="http:&#x2F;&#x2F;ee380.stanford.edu&#x2F;Abstracts&#x2F;161130-video.html" rel="nofollow">http:&#x2F;&#x2F;ee380.stanford.edu&#x2F;Abstracts&#x2F;161130-video.html</a><p>One thing I didn&#x27;t understand, is that CONIKS is not something where clients can insert keys in an unrestricted manner: There is a gatekeeper (run by the service provider), who does some sort of testing&#x2F;control before inserting a new key.
评论 #13571952 未加载
ghughesover 8 years ago
Google&#x27;s Key Transparency project [1] is based on this.<p>[1] <a href="https:&#x2F;&#x2F;security.googleblog.com&#x2F;2017&#x2F;01&#x2F;security-through-transparency.html?m=1" rel="nofollow">https:&#x2F;&#x2F;security.googleblog.com&#x2F;2017&#x2F;01&#x2F;security-through-tra...</a>
评论 #13571932 未加载