M.A.I.D.: Difference between revisions

From Noisebridge
Jump to navigation Jump to search
No edit summary
m (add link to my wikipage)
Line 27: Line 27:
== History ==
== History ==


M.A.I.D was [http://events.ccc.de/congress/2005/fahrplan/events/1112.en.html initially discussed] by it's creator Jacob Appelbaum at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.
M.A.I.D was [http://events.ccc.de/congress/2005/fahrplan/events/1112.en.html initially discussed] by it's creator [[User:Ioerror|Jacob Appelbaum]] at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.

Revision as of 02:47, 24 September 2009

MAID is (Mutually) Assured Information Destruction: "Maid cleans up after you're no longer around."

General overview

M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.

Features

  • Provable authentication (with either local or remote attestation)
  • Cryptographic key storage on remote systems
  • Optional distress coding during authentication
  • Time sensitive user configurable key destruction
  • Strong multi-party anonymity is a requirement for participation.

Threat model

Example use case

Software specification

Client specification

Server specification

Legal information

We believe this system will possibly work exactly one time for a single person. Consult with a qualified lawyer or solicitor in your legal jurisdiction. You may be that single lucky person.

History

M.A.I.D was initially discussed by it's creator Jacob Appelbaum at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.