Privacy

From Organic Design wiki
Revision as of 09:34, 18 February 2006 by Nad (talk | contribs) (Key generation and routing)
  1. Sessions

Every context of execution can be considered as a session in the nodal model. Any context can adjust its security aspects with logins and logouts. Even peers use the same authentication process for routing their own secure information such as access information or currerency.

  1. Key generation and routing

This security is handled with any of the standard algorithms such as DES or AES, but using the inherent organisational methods to generate and maintain a diverse population of private keys so that any context of information can be made arbitrarily secure dynamically and independently. A small portion of bandwidth is dedicated to random connectivity for creating keys with more diverse properties, and for finding new efficient routes.

  1. Organisational aspects requiring security
  • Logins and passwords need to be securely routed amongst peers
  • Financial transactions and account balances must be trusted
  • Users personal information must be kept private
  1. Available key properties/constraints
  • Media its resided on (RAM, HDD, Removable etc)
  • Peers its resided on
  • Protocols its travelled through