M.A.I.D.: Difference between revisions

From Noisebridge
Jump to navigation Jump to search
(Initial brain dump)
 
No edit summary
Line 1: Line 1:
M.A.I.D is (Mutually) Assured Information Destruction: ''"Maid cleans up after you're no longer around."''
MAID is (Mutually) Assured Information Destruction: ''"Maid cleans up after you're no longer around."''


== General overview ==
== General overview ==

Revision as of 02:25, 24 September 2009

MAID is (Mutually) Assured Information Destruction: "Maid cleans up after you're no longer around."

General overview

M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.

Features

  • Provable authentication (with either local or remote attestation)
  • Cryptographic key storage on remote systems
  • Optional distress coding during authentication
  • Time sensitive user configurable key destruction
  • Strong multi-party anonymity is a requirement for participation.

Threat model

Example use case

Software specification

Client specification

Server specification

Legal information

We believe this system will possibly work exactly one time for a single person. Consult with a qualified lawyer or solicitor in your legal jurisdiction. You may be that single lucky person.

History

M.A.I.D was initially discussed by it's creator Jacob Appelbaum at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.