Category:2011-Observability
- (TK) How can we observe the information that we, our computer or ourselves, provide the "network" or public is not going to be maliciously used?
- (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
- (HS) One way is to minimize what information you give away, or at least 'be aware' of what you are giving away. However, observability is not limited to just information that we send out. We are also looking for ways to observe contracts being fulfilled.
- (HS) Also besides the fingerprinting, there is no guarantee that once your information goes to a party that you want with any fingerprint mechanism or security measure, once they have it decrypted, you can't (assuming they are not caught) stop them from passing the information on.
- (SL) What is and is not feasibly observable?
- (SL) What kinds of observations are there? Are we strictly talking about observations without any humans involved at all?
We might be able to divide Observability into two subsections:
Awareness
Awareness is *context* for information. Meta-information.
Analogy
Like going to a website and knowing not only about your visit, but who else is there, etc.
Assurance
Assurance is far more related to contracts, and is pretty self-explanatory.
Pages in category "2011-Observability"
This category contains only the following page.