M.A.I.D.: Difference between revisions

From Noisebridge
Jump to navigation Jump to search
Rubin109 (talk | contribs)
No edit summary
m Reverted edits by Rubin109 (talk) to last revision by JeffreyATW
 
Line 1: Line 1:
[[File:Control.png]]
MAID is (Mutually) Assured Information Destruction: ''"Maid cleans up after you're no longer around."''
MAID is (Mutually) Assured Information Destruction: ''"Maid cleans up after you're no longer around."''



Latest revision as of 09:28, 5 October 2017

MAID is (Mutually) Assured Information Destruction: "Maid cleans up after you're no longer around."

General overview

[edit | edit source]

M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.

Features

[edit | edit source]
  • Provable authentication (with either local or remote attestation)
  • Cryptographic key storage on remote systems
  • Optional distress coding during authentication
  • Time sensitive user configurable key destruction
  • Strong multi-party anonymity is a requirement for participation.

Threat model

[edit | edit source]

Example use case

[edit | edit source]

Software specification

[edit | edit source]

Client specification

[edit | edit source]

Server specification

[edit | edit source]
[edit | edit source]

We believe this system will possibly work exactly one time for a single person. Consult with a qualified lawyer or solicitor in your legal jurisdiction. You may be that single lucky person.

History

[edit | edit source]

M.A.I.D was initially discussed by it's creator Jacob Appelbaum at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.