.
How-To Guide: Two-Factor Authentication

How-To Guide: Two-Factor Authentication

Passwords, everyone loves to hate them and still, in the era of digital certificates, fingerprints, and voice recognition, we use them on a daily basis and want users to memorize tens of different complex passwords. So they cheat and passwords get reused, written down on a piece of paper, you name it. Not that service providers always get this right either.

Who put ABAC in my RBAC?

Readers know that Attribute-based Access Control (ABAC) is a bit of an obsession with me. It stems from the want to have something like an ABAC system in my little bag of tricks. An authorization engine that scales to everyday usage, without proprietary, bloated or cumbersome baggage to weigh it down.

August 10th, DEF CON 26

August 10th, DEF CON 26

Howard Chu (CTO for Symas Corporation) will present at DEF CON 26 in the Blockchain & Cryptocurrency Open Security Village. His keynote speech, “Inside Monero” will take a deeper look into the Monero Project and its use of Symas’s Lightning Memory-mapped Database.