Difference between revisions of "Category:2011-Observability"

From Soma-notes
Jump to navigation Jump to search
Line 1: Line 1:
* (TK) How can we observe the information that we, our computer or ourselves, provide the "network" or public is not going to be maliciously used?
* (TK) How can we observe the information that we, our computer or ourselves, provide the "network" or public is not going to be maliciously used?
** (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
** (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
 
** (HS) One way is to minimize what information you give away, or at least 'be aware' of what you are giving away. However, observability is not limited to just information that we send out. We are also looking for ways to observe contracts being fulfilled. 
[[Category:2011-O&C]]
[[Category:2011-O&C]]

Revision as of 12:08, 17 March 2011

  • (TK) How can we observe the information that we, our computer or ourselves, provide the "network" or public is not going to be maliciously used?
    • (TK) One point that was discussed in class was the idea of a digital fingerprint. Is this really feasible? and how would it work?
    • (HS) One way is to minimize what information you give away, or at least 'be aware' of what you are giving away. However, observability is not limited to just information that we send out. We are also looking for ways to observe contracts being fulfilled.

Pages in category "2011-Observability"

This category contains only the following page.