|(2 intermediate revisions by 2 users not shown)|
|Line 27:||Line 27:|
== History ==
== History ==
M.A.I.D was [http://events.ccc.de/congress/2005/fahrplan/events/1112.en.html initially discussed] by it's creator Jacob Appelbaum at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.
M.A.I.D was [http://events.ccc.de/congress/2005/fahrplan/events/1112.en.html initially discussed] by it's creator Jacob Appelbaumat the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.
Latest revision as of 11:07, 18 November 2010
MAID is (Mutually) Assured Information Destruction: "Maid cleans up after you're no longer around."
 General overview
M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.
- Provable authentication (with either local or remote attestation)
- Cryptographic key storage on remote systems
- Optional distress coding during authentication
- Time sensitive user configurable key destruction
- Strong multi-party anonymity is a requirement for participation.
 Threat model
 Example use case
 Software specification
 Client specification
 Server specification
 Legal information
We believe this system will possibly work exactly one time for a single person. Consult with a qualified lawyer or solicitor in your legal jurisdiction. You may be that single lucky person.