Category:2011-Observability: Difference between revisions

From Soma-notes
Tkomal (talk | contribs)
No edit summary
Slyons (talk | contribs)
 
(6 intermediate revisions by 2 users not shown)
Line 1: Line 1:
* (TK) How can we observe the information that we, our computer or ourselves, provide the "network" or public is not going to be maliciously used?
* (TK) How can we observe the information that we, our computer or ourselves, provide the "network" or public is not going to be maliciously used?
** (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
** (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
** (HS) One way is to minimize what information you give away, or at least 'be aware' of what you are giving away. However, observability is not limited to just information that we send out. We are also looking for ways to observe contracts being fulfilled. 
** (HS) Also besides the fingerprinting, there is no guarantee that once your information goes to a party that you want with any fingerprint mechanism or security measure, once they have it decrypted, you can't (assuming they are not caught) stop them from passing the information on.
* (SL) What is and is not feasibly observable?
* (SL) What kinds of observations are there? Are we strictly talking about observations without any humans involved at all?
We might be able to divide Observability into two subsections:
= Awareness =
Awareness is *context* for information. Meta-information.
== Analogy ==
Like going to a website and knowing not only about your visit, but who else is there, etc.
= Assurance =
Assurance is far more related to contracts, and is pretty self-explanatory.


[[Category:2011-O&C]]
[[Category:2011-O&C]]

Latest revision as of 17:32, 17 March 2011

  • (TK) How can we observe the information that we, our computer or ourselves, provide the "network" or public is not going to be maliciously used?
    • (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
    • (HS) One way is to minimize what information you give away, or at least 'be aware' of what you are giving away. However, observability is not limited to just information that we send out. We are also looking for ways to observe contracts being fulfilled.
    • (HS) Also besides the fingerprinting, there is no guarantee that once your information goes to a party that you want with any fingerprint mechanism or security measure, once they have it decrypted, you can't (assuming they are not caught) stop them from passing the information on.
  • (SL) What is and is not feasibly observable?
  • (SL) What kinds of observations are there? Are we strictly talking about observations without any humans involved at all?

We might be able to divide Observability into two subsections:

Awareness

Awareness is *context* for information. Meta-information.

Analogy

Like going to a website and knowing not only about your visit, but who else is there, etc.

Assurance

Assurance is far more related to contracts, and is pretty self-explanatory.

Pages in category "2011-Observability"

This category contains only the following page.