How to allow a user to login via client X.509 certificate or username/password?

I have a niche website programmed by a volunteer. Like pretty much every website it’s secured via TLS, and the main page doesn’t let you do much except login via username & password or request an account. Some users recently requested … Continue reading How to allow a user to login via client X.509 certificate or username/password?

Specific Security Risks in Decentralized Identity and Self-Sovereign Identity (SSI)

I am exploring Self-Sovereign Identity (SSI) as a decentralized approach to identity management, similar to how Bitcoin addresses financial systems through blockchain (as verifiable data registry (VDR)). However, I am trying to understand … Continue reading Specific Security Risks in Decentralized Identity and Self-Sovereign Identity (SSI)

Preventing credential theft in the age of AI

In this Help Net Security video, Tina Srivastava, MIT Lecturer and CEO of Badge, discusses a 20-year cryptography problem – using biometrics for authentication without storing a face/finger/voice print. This has massive implications for corporate… Continue reading Preventing credential theft in the age of AI

The issue of public/private signals when generating zero-knowledge proofs with Circom [migrated]

Circom is a circuit language capable of generating zero-knowledge proofs, which involves some input signals and output signals. If all the input and output signals during the generation of the zero-knowledge proof are public, meaning that … Continue reading The issue of public/private signals when generating zero-knowledge proofs with Circom [migrated]

Simplifying decentralized identity systems for everyday use

In this Help Net Security interview, Carla Roncato, VP of Identity at WatchGuard Technologies, discusses how companies can balance privacy, security, and usability in digital identity systems. She emphasizes modern techniques like biometrics and passke… Continue reading Simplifying decentralized identity systems for everyday use