gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] branch master updated: fix


From: gnunet
Subject: [taler-anastasis] branch master updated: fix
Date: Sat, 06 Jun 2020 19:52:43 +0200

This is an automated email from the git hooks/post-receive script.

dennis-neufeld pushed a commit to branch master
in repository anastasis.

The following commit(s) were added to refs/heads/master by this push:
     new 8719353  fix
8719353 is described below

commit 8719353bfff58971fda2e5c74c84bc844eefe8d5
Author: Dennis Neufeld <dennis.neufeld@students.bfh.ch>
AuthorDate: Sat Jun 6 17:52:39 2020 +0000

    fix
---
 doc/thesis/introduction.tex | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/doc/thesis/introduction.tex b/doc/thesis/introduction.tex
index 071efbd..34bdbc8 100644
--- a/doc/thesis/introduction.tex
+++ b/doc/thesis/introduction.tex
@@ -15,7 +15,7 @@ For Anastasis we have following design principles, in order 
of importance:
 
 \subsection{Approaches}
 \subsubsection*{Secret sharing and recovery}
-Our approach to solve the problem of key management is to let the user split 
their secret across multiple escrow providers (see figure 
\ref{fig:system_arch2}). To restore the secret again, the user has to follow 
standard authentication procedures. After successful authentication the user 
gets the secret shares to reassemble the secret.
+Our approach to solve the problem of key management is to let the user split 
their secret across multiple escrow providers (see 
figure~\ref{fig:system_arch2}). To restore the secret again, the user has to 
follow standard authentication procedures. After successful authentication the 
user gets the secret shares to reassemble the secret.
 \begin{figure}[H]
 \centering
 \includegraphics[scale=0.33]{images/system-architecture_2.png}
@@ -24,7 +24,7 @@ Our approach to solve the problem of key management is to let 
the user split the
 \end{figure}
 
 \subsubsection*{Derive user identifier}
-Every person has some hard to guess, semi-private and unforgettably inherent 
attributes such as name and passport number, social security number or AHV 
number (in Switzerland). We use those attributes to derive an user identifier 
from (see figure \ref{fig:user_id}).
+Every person has some hard to guess, semi-private and unforgettably inherent 
attributes such as name and passport number, social security number or AHV 
number (in Switzerland). We use those attributes to derive an user identifier 
from (see figure~\ref{fig:user_id}).
 \begin{figure}[H]
 \centering
 \includegraphics[scale=0.3]{images/user_id.png}
@@ -44,7 +44,7 @@ Pretty Easy privacy (short p\equiv p) is "a cyber security 
solution which protec
 
 \subsubsection{Digital currencies and payment solutions}
 \subsubsection*{Bitcoin}
-Another application relying on a core secret are cryptocurrencies like 
Bitcoin. Each user of Bitcoin needs a so called Wallet which stores and 
protects the private keys of the user. Those private keys legitimate its owners 
to spend the bitcoins corresponding to the keys \cite{LLLW*2017}. Therefore 
losing those keys means losing all the corresponding Bitcoins which in some 
cases could be a loss of millions of Euros \cite{millions_lost}. The following 
graphic illustrates the keys used in B [...]
+Another application relying on a core secret are cryptocurrencies like 
Bitcoin. Each user of Bitcoin needs a so called Wallet which stores and 
protects the private keys of the user. Those private keys legitimate its owners 
to spend the bitcoins corresponding to the keys~\cite{LLLW*2017}. Therefore 
losing those keys means losing all the corresponding Bitcoins which in some 
cases could be a loss of millions of Euros~\cite{millions_lost}. The following 
graphic illustrates the keys used in B [...]
 \begin{figure}[H]
        \centering
        \includegraphics[scale=3.5]{images/bitcoin-keys.png}
@@ -60,4 +60,4 @@ To avoid using low-entropy passwords and password reuse some 
people use software
 Anastasis can store the passwords for password managers.
 
 \subsubsection{Hard drive encryption}
-Many companies need to backup high sensitive data to be able to recover them 
in an emergency case. Those backups are often stored at external hard drives 
which are encrypted using software like BitLocker~\cite{bitlocker}. For 
encryption and decryption of the hardware additionally to the Trusted Platform 
Module (TPM)~\cite{bajikar2002} of the computer or a key file often a password 
is needed. In case of loosing a key file or a password, Anastasis can prevent 
from data loss.
\ No newline at end of file
+Many companies need to backup high sensitive data to be able to recover them 
in an emergency case. Those backups are often stored at external hard drives 
which are encrypted using software like BitLocker~\cite{bitlocker}. For 
encryption and decryption of the hardware additionally to the Trusted Platform 
Module (TPM)~\cite{bajikar2002} of the computer or a key file often a password 
is needed. In case of loosing a key file or a password, Anastasis can save from 
data loss.
\ No newline at end of file

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]