M.A.I.D.: Difference between revisions
Jump to navigation
Jump to search
(Initial brain dump) |
JeffreyATW (talk | contribs) m (Reverted edits by Rubin109 (talk) to last revision by JeffreyATW) |
||
(10 intermediate revisions by 7 users not shown) | |||
Line 1: | Line 1: | ||
MAID is (Mutually) Assured Information Destruction: ''"Maid cleans up after you're no longer around."'' | |||
== General overview == | == General overview == | ||
Line 27: | Line 27: | ||
== History == | == History == | ||
M.A.I.D was [ | M.A.I.D was [https://events.ccc.de/congress/2005/fahrplan/events/1112.en.html initially discussed] by it's creator [[User:Ioerror|Jacob Appelbaum]] at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005. |
Latest revision as of 09:28, 5 October 2017
MAID is (Mutually) Assured Information Destruction: "Maid cleans up after you're no longer around."
General overview[edit]
M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.
Features[edit]
- Provable authentication (with either local or remote attestation)
- Cryptographic key storage on remote systems
- Optional distress coding during authentication
- Time sensitive user configurable key destruction
- Strong multi-party anonymity is a requirement for participation.
Threat model[edit]
Example use case[edit]
Software specification[edit]
Client specification[edit]
Server specification[edit]
Legal information[edit]
We believe this system will possibly work exactly one time for a single person. Consult with a qualified lawyer or solicitor in your legal jurisdiction. You may be that single lucky person.
History[edit]
M.A.I.D was initially discussed by it's creator Jacob Appelbaum at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.