Difference between revisions of "Privacy"

From Organic Design wiki
 
(Key generation and routing)
Line 1: Line 1:
 +
# Sessions
 +
Every context of execution can be considered as a session in the nodal model. Any context can adjust its security aspects with logins and logouts. Even peers use the same authentication process for routing their own secure information such as access information or currerency.
 +
 
# Key generation and routing
 
# Key generation and routing
Key generation and routing are an integral part of the network layer since many of the fundamental processes of all organisation require security.
+
This security is handled with any of the standard algorithms such as DES or AES, but using the inherent organisational methods to generate and maintain a diverse population of private keys so that any context of information can be made arbitrarily secure dynamically and independently. A small portion of bandwidth is dedicated to random connectivity for creating keys with more diverse properties, and for finding new efficient routes.
  
 
# Organisational aspects requiring security
 
# Organisational aspects requiring security

Revision as of 09:34, 18 February 2006

  1. Sessions

Every context of execution can be considered as a session in the nodal model. Any context can adjust its security aspects with logins and logouts. Even peers use the same authentication process for routing their own secure information such as access information or currerency.

  1. Key generation and routing

This security is handled with any of the standard algorithms such as DES or AES, but using the inherent organisational methods to generate and maintain a diverse population of private keys so that any context of information can be made arbitrarily secure dynamically and independently. A small portion of bandwidth is dedicated to random connectivity for creating keys with more diverse properties, and for finding new efficient routes.

  1. Organisational aspects requiring security
  • Logins and passwords need to be securely routed amongst peers
  • Financial transactions and account balances must be trusted
  • Users personal information must be kept private
  1. Available key properties/constraints
  • Media its resided on (RAM, HDD, Removable etc)
  • Peers its resided on
  • Protocols its travelled through