This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 12 lines
!!! Overview
[{$pagename}] ([TNO]) is an approach towards [Internet] and software [security] issues. In all [Internet] communication and software packages where some sort of secrecy is needed, usually some sort of [encryption] is applied. The [{$pagename}] approach teaches that no one (but oneself) should be trusted when it comes to the storage of the [keys] behind the applied [encryption] technology.
Many [encryption] technologies rely on the trust of an external [Third-party]. For instance the security of secure end-to-end [TLS] connections relies on the trust of a [Certificate Authority] ([CA]).
[{$pagename}] design philosophy requires that the [keys] for [encryption] should always be, and stay, in the hands of the user that applies them. This implies that no external [Third-party] can access the [encrypted] [data] (assumed that the [encryption] is strong enough). [{$pagename}] also implies that an external party cannot provide a backup mechanism for recovery.
Although the philosophy of [{$pagename}] at least assures the [Confidentiality] of the communication of the user that creates it, in real life and in society many communication means rely on a [trust] [relationship] between at least two parties.[{$pagename}] is also often part of [Zero Trust] systems.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]