M.A.I.D.: Difference between revisions
Jump to navigation
Jump to search
JeffreyATW (talk | contribs) m Reverted edits by 185.163.1.11 (talk) to last revision by JeffreyATW |
JeffreyATW (talk | contribs) m Reverted edits by Rubin109 (talk) to last revision by JeffreyATW |
| (One intermediate revision by one other user not shown) | |
(No difference)
| |
Latest revision as of 09:28, 5 October 2017
MAID is (Mutually) Assured Information Destruction: "Maid cleans up after you're no longer around."
General overview
[edit | edit source]M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.
Features
[edit | edit source]- Provable authentication (with either local or remote attestation)
- Cryptographic key storage on remote systems
- Optional distress coding during authentication
- Time sensitive user configurable key destruction
- Strong multi-party anonymity is a requirement for participation.
Threat model
[edit | edit source]Example use case
[edit | edit source]Software specification
[edit | edit source]Client specification
[edit | edit source]Server specification
[edit | edit source]Legal information
[edit | edit source]We believe this system will possibly work exactly one time for a single person. Consult with a qualified lawyer or solicitor in your legal jurisdiction. You may be that single lucky person.
History
[edit | edit source]M.A.I.D was initially discussed by it's creator Jacob Appelbaum at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.