asteroza + trust   28

ZeroTier | Software Defined Networking
Sorta like Google's BeyondCorp perimeterless VPN-ish setup, using a "global" LAN that is crypographically protected
VPN  network  virtualization  SDN  opensource  software  service  BeyondCorp  deperimeterization  perimeterless  zero  trust 
september 2016 by asteroza
Changes to Trusted Certificate Authorities in Android Nougat | Android Developer...
Uh, so how do I explicitly force an app to trust my added CA if the app itself isn't importing it?
android  default  CA  trust  anchor  security  Delicious 
july 2016 by asteroza
Connected Living
GSMA laying down the law on cellular IoT security
GSMA  IoT  security  guideline  reference  information  trust  root  model  GSM  cellular  Delicious 
february 2016 by asteroza
Trusty CAs
Interesting CA trust mapping, but hope you got a beefy PC/browser...
CA  certificate  authority  trust  mapping  infoviz  information  visualization  map  treemap  cluster  Delicious 
december 2015 by asteroza
ICSI Certificate Notary
Interesting visualization of global certificate authorities and their trust trees, though it gets distorted by that one german CA with the 200+ sub CA's...
Berkeley  infoviz  SSL  security  hierarchy  tree  trust  authority  certificate  CA  visualization  information  Delicious 
december 2012 by asteroza
TrustEgg - The simplest way to save for a child's future
A service for easily setting up and contributing to a child's trust fund. The general aim is to make it less of a hassle, and it isn't a high risk trust investment scheme, going for more middle-of-the-road investing. It will probably reduce teh actual amount of choices a user can do, to keep people from screwing themselves too heavily.
child  trust  fund  trustfund  setup  maintenance  contribution  service  finance  investment  Delicious 
august 2012 by asteroza
Unix Root Access Control - Linux Sudo Access - Unix Privilege Management | PowerBroker Servers
Once invoked this records EVERYTHING root does, every keystroke. Which means if anyone manages to look at the logs they'll see passwords too. If you are cool with that (only look if something bad happened stance), this may not be a bad thing for a system accountability and logging solution. Beats manual change control entry...
Powerbroker  linux  sysadmin  administration  least  priviledge  account  keystroke  logging  monitoring  security  trust  accountability  server  audit  auditing  software  Delicious 
january 2011 by asteroza

related tags

2.0  access  account  accountability  active  AD  administration  amazon  analysis  analytics  anchor  android  attack  audit  auditing  authority  automatic  behavior  Berkeley  BeyondCorp  book  bouncycastle  boundary  breakout  business  CA  cellular  certificate  chain  child  cluster  communication  community  connection  content  contribution  cryptography  CTL  cultural  death  default  delegation  Delicious  deperimeterization  design  development  devices  directory  DIY  docker  document  electronics  encryption  enterprise  estate  events  example  exploit  feedback  filter  finance  firefox  forest  FR  framework  Francis  Fukuyama  function  fund  golden  GPO  graph  graphML  group  GSM  GSMA  guide  guideline  hacking  hardware  hierarchy  Higgins  HSM  https  identity  inbound  information  infoviz  infrastructure  intelligence  investment  IoT  IT  karma  KB2677070  kerberos  keystroke  least  linux  list  logging  maintenance  management  map  mapping  mechanism  media  microsoft  mimikatz  model  module  monitoring  network  networking  news  NFR  notary  opensource  overview  pentesting  perimeterless  personal  pinning  PKI  plan  planning  platform  policy  Powerbroker  priviledge  processing  programming  protocol  realtime  reference  relationship  remote  reputation  requirements  research  revocaton  root  SDN  security  server  service  setting  setup  sharing  social  software  SSL  store  SwiftRiver  symantics  syntax  sysadmin  system  technology  TGT  ticket  tips  TLS  tracking  tree  treemap  tricks  trust  trustfund  update  URL  Ushahidi  value  veracity  verification  virtualization  visualization  VPEC-T  VPN  web  will  windows  zero 

Copy this bookmark:



description:


tags: