Category:2011-Observability: Difference between revisions

From Soma-notes
No edit summary
No edit summary
Line 2: Line 2:
** (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
** (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
** (HS) One way is to minimize what information you give away, or at least 'be aware' of what you are giving away. However, observability is not limited to just information that we send out. We are also looking for ways to observe contracts being fulfilled.   
** (HS) One way is to minimize what information you give away, or at least 'be aware' of what you are giving away. However, observability is not limited to just information that we send out. We are also looking for ways to observe contracts being fulfilled.   
** (HS) Also besides the fingerprinting, there is not guarantee that once your information goes to a party that you want with any fingerprint mechanism or security measure, once they have it decrypted, you can't (assuming they are not caught) stop them from passing the information on.  
** (HS) Also besides the fingerprinting, there is no guarantee that once your information goes to a party that you want with any fingerprint mechanism or security measure, once they have it decrypted, you can't (assuming they are not caught) stop them from passing the information on.  
[[Category:2011-O&C]]
[[Category:2011-O&C]]

Revision as of 16:16, 17 March 2011

  • (TK) How can we observe the information that we, our computer or ourselves, provide the "network" or public is not going to be maliciously used?
    • (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
    • (HS) One way is to minimize what information you give away, or at least 'be aware' of what you are giving away. However, observability is not limited to just information that we send out. We are also looking for ways to observe contracts being fulfilled.
    • (HS) Also besides the fingerprinting, there is no guarantee that once your information goes to a party that you want with any fingerprint mechanism or security measure, once they have it decrypted, you can't (assuming they are not caught) stop them from passing the information on.

Pages in category "2011-Observability"

This category contains only the following page.