asteroza + verification   29

G Suite Updates Blog: Control access to corporate data on Chrome, Mac, and Windows devices with endpoint verification
There's a helper app for windows and mac to do endpoint verification, beyond the chrome browser extension. This allows registering and managing access.
google  cloud  endpoint  registration  verification  sysadmin  device  management  security 
march 2019 by asteroza
Endpoint Verification - Chrome Web Store
Google now has an endpoint scanner as a chrome plugin ( native app install...) to do health checks of BYOD devices before accessing Gsuite stuff.
google  security  BYOD  health  check  test  chrome  browser  plugin  addon  extension  endpoint  verification  OS  status  inventory  asset  management  monitoring 
july 2018 by asteroza
Proof of Position
Interesting, but the risk of GPS spoofing/false location makes this still a poor security solution, in terms of a record of location.
timestamp  bitcoin  blockchain  stamp  message  positionstamp  archive  record  proof  security  location  verification  CyberLocator  Delicious 
july 2014 by asteroza
How it works - Accounts Help
Interesting 2 factor authentication via phone for google/gmail accounts
google  account  2  two  step  factor  authentication  verification  phone  SMS  PIN  online  security  gmail  iPhone  android  password  Delicious 
june 2011 by asteroza
Updated: Google Says It Is Still Examining Korea's Real-Name Verification Law
Seems korean netizens are caught between a rock and a hard place. The government wants to suppress via fear of legal retribution both mob mentality and political dissent. One is the noble goal of government to protect the people from themselves, the other is the self protecting ego of what would functionally be a police state. As always, the road to hell is paved with good intentions...
google  korea  real  name  verification  law  censorship  dissent  suppression  privacy  anonymity  internet  Delicious 
april 2009 by asteroza

related tags

2.0  account  addon  advocacy  agriculture  algorithm  analysis  analytics  android  anonymity  AOptix  archive  asset  audio  authentication  authenticity  biometric  bitcoin  blockchain  boilerplate  browser  bug  business  BYOD  bypass  CA  case  censorship  certificate  certified  chain  check  checking  chicken  china  chrome  cloud  code  computer  computing  content  continuous  correctness  coverity  cryotgraphic  cryptographic  cryptography  CyberLocator  degree  Delicious  design  development  device  devices  dissent  ecurity  ed25519  education  electronics  emerging  encryption  endpoint  essay  EU  europe  exam  execution  extension  fact  factor  false  FAST21  federated  filter  fingerprint  firefox  forensics  formal  generated  generator  gmail  google  group  guide  hacking  handshake  hardware  health  hijack  history  HMAC  howto  humor  ID  identification  identity  image  information  intelligence  internet  inventory  iPhone  iris  journalism  korea  law  learning  library  listeningpost  lobbying  location  logisitics  management  mathematics  media  message  microsoft  monitoring  MyID  name  network  news  noise  NSTIC  online  openID  opensource  OpenSSL  OS  paper  parameter  password  PDF  PDF/A  pentesting  perspectives  phone  physical  PIN  platform  plugin  positionstamp  privacy  processing  procotoring  programming  proof  protocol  provider  quantum  reader  real  realtime  recognition  record  recording  reference  registration  remote  research  retina  rumor  rust  scanner  scanning  science  Secure  securexam  security  service  sharing  shell  signing  SMS  social  software  speech  SSL  stamp  standard  startup  static  status  step  supply  suppression  SwiftRiver  sysadmin  technique  test  testing  timestamp  tools  tracking  training  true  trust  truth  tutorial  two  UGC  user  Ushahidi  utilities  veracity  verification  verified  video  voice  web  webcam  whitelist  windows 

Copy this bookmark: