No, Dr. Franklin: safety IS liberty.

Mapping Security Concepts to Control

  1. Authorization: control over action
  2. Authentication: control over identity
  3. Authenticity: control over reproduction
  4. Restricted delivery: control over reading of content
  5. Fingerprinting: control over altering content
  6. Connectivity: control over delivery

Authorization

Authentication

Authenticity

Restricted Delivery

Fingerprinting

Connectivity

In Summary

--

--

--

Obligate infovore. All posts made with 100% recycled electrons, sustainably crafted by artisanal artisans. He/him/his.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Facebook is excluding users who have not activated Facebook Protect

NEAR Protocol Research Report — May 2021

Why Jailbreak is dangerous

Are you prepared for a website security breach?

Community Call #15

How to Swap MBL -> WMBL and Stake on Chickenswap?

Source Protection in 2017: A Starter Guide

Digital Identity Solutions — Why They Matter

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alex Feinman

Alex Feinman

Obligate infovore. All posts made with 100% recycled electrons, sustainably crafted by artisanal artisans. He/him/his.

More from Medium

Bitcoin: Has The Bottom Been Reached?

Bitcoin

Why should you be excited about SikkaPe?

Celsius Network CRASH… What happened to Celsius Network?

3 Ways the Universe May End. Awesome.