[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[taler-anastasis] branch master updated: fix
From: |
gnunet |
Subject: |
[taler-anastasis] branch master updated: fix |
Date: |
Sat, 06 Jun 2020 19:52:43 +0200 |
This is an automated email from the git hooks/post-receive script.
dennis-neufeld pushed a commit to branch master
in repository anastasis.
The following commit(s) were added to refs/heads/master by this push:
new 8719353 fix
8719353 is described below
commit 8719353bfff58971fda2e5c74c84bc844eefe8d5
Author: Dennis Neufeld <dennis.neufeld@students.bfh.ch>
AuthorDate: Sat Jun 6 17:52:39 2020 +0000
fix
---
doc/thesis/introduction.tex | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/doc/thesis/introduction.tex b/doc/thesis/introduction.tex
index 071efbd..34bdbc8 100644
--- a/doc/thesis/introduction.tex
+++ b/doc/thesis/introduction.tex
@@ -15,7 +15,7 @@ For Anastasis we have following design principles, in order
of importance:
\subsection{Approaches}
\subsubsection*{Secret sharing and recovery}
-Our approach to solve the problem of key management is to let the user split
their secret across multiple escrow providers (see figure
\ref{fig:system_arch2}). To restore the secret again, the user has to follow
standard authentication procedures. After successful authentication the user
gets the secret shares to reassemble the secret.
+Our approach to solve the problem of key management is to let the user split
their secret across multiple escrow providers (see
figure~\ref{fig:system_arch2}). To restore the secret again, the user has to
follow standard authentication procedures. After successful authentication the
user gets the secret shares to reassemble the secret.
\begin{figure}[H]
\centering
\includegraphics[scale=0.33]{images/system-architecture_2.png}
@@ -24,7 +24,7 @@ Our approach to solve the problem of key management is to let
the user split the
\end{figure}
\subsubsection*{Derive user identifier}
-Every person has some hard to guess, semi-private and unforgettably inherent
attributes such as name and passport number, social security number or AHV
number (in Switzerland). We use those attributes to derive an user identifier
from (see figure \ref{fig:user_id}).
+Every person has some hard to guess, semi-private and unforgettably inherent
attributes such as name and passport number, social security number or AHV
number (in Switzerland). We use those attributes to derive an user identifier
from (see figure~\ref{fig:user_id}).
\begin{figure}[H]
\centering
\includegraphics[scale=0.3]{images/user_id.png}
@@ -44,7 +44,7 @@ Pretty Easy privacy (short p\equiv p) is "a cyber security
solution which protec
\subsubsection{Digital currencies and payment solutions}
\subsubsection*{Bitcoin}
-Another application relying on a core secret are cryptocurrencies like
Bitcoin. Each user of Bitcoin needs a so called Wallet which stores and
protects the private keys of the user. Those private keys legitimate its owners
to spend the bitcoins corresponding to the keys \cite{LLLW*2017}. Therefore
losing those keys means losing all the corresponding Bitcoins which in some
cases could be a loss of millions of Euros \cite{millions_lost}. The following
graphic illustrates the keys used in B [...]
+Another application relying on a core secret are cryptocurrencies like
Bitcoin. Each user of Bitcoin needs a so called Wallet which stores and
protects the private keys of the user. Those private keys legitimate its owners
to spend the bitcoins corresponding to the keys~\cite{LLLW*2017}. Therefore
losing those keys means losing all the corresponding Bitcoins which in some
cases could be a loss of millions of Euros~\cite{millions_lost}. The following
graphic illustrates the keys used in B [...]
\begin{figure}[H]
\centering
\includegraphics[scale=3.5]{images/bitcoin-keys.png}
@@ -60,4 +60,4 @@ To avoid using low-entropy passwords and password reuse some
people use software
Anastasis can store the passwords for password managers.
\subsubsection{Hard drive encryption}
-Many companies need to backup high sensitive data to be able to recover them
in an emergency case. Those backups are often stored at external hard drives
which are encrypted using software like BitLocker~\cite{bitlocker}. For
encryption and decryption of the hardware additionally to the Trusted Platform
Module (TPM)~\cite{bajikar2002} of the computer or a key file often a password
is needed. In case of loosing a key file or a password, Anastasis can prevent
from data loss.
\ No newline at end of file
+Many companies need to backup high sensitive data to be able to recover them
in an emergency case. Those backups are often stored at external hard drives
which are encrypted using software like BitLocker~\cite{bitlocker}. For
encryption and decryption of the hardware additionally to the Trusted Platform
Module (TPM)~\cite{bajikar2002} of the computer or a key file often a password
is needed. In case of loosing a key file or a password, Anastasis can save from
data loss.
\ No newline at end of file
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.