jzhao.xyz

Search

Search IconIcon to open search

Security

Last updated Oct 14, 2021 Edit Source

Source: Playdough Protocols in Kernel

Integrity of information is critical to relationships of trust as we saw in the episode on game theory.

# Internet

On security in the internet

Main excuse: “when $x$ was designed, there were only a few players and they all know and trusted each other”

“Secure” web servers are the equivalent of heavy armoured cars. The problem is, they are being used to transfer rolls of coins and checks written in crayon by people on park benches to merchants doing business in cardboard boxes from beneath highway bridges. Further, the roads are subject to random detours, anyone with a screwdriver can control the traffic lights, and there are no police. – Garfinkel, Spafford, “Web Security and Commerce”

A lot of the internet is based on good faith and relying on users to be good actors

What level of the internet computing stack should be responsible for security? Options:

# Terminology

# Block Ciphers

# Certification Authorities (CA)

# Preventing Replay Attacks

See also: hash functions