M.A.I.D.

From Noisebridge
(Difference between revisions)
Jump to: navigation, search
m (Reverted edits by 78.101.228.232 (Talk) to last revision by Ioerror)
 
Line 1: Line 1:
 
MAID is (Mutually) Assured Information Destruction: ''"Maid cleans up after you're no longer around."''
 
MAID is (Mutually) Assured Information Destruction: ''"Maid cleans up after you're no longer around."''
  
>== General overview ==
+
== General overview ==
  
 
M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.
 
M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.
 
----
 
<div style="background: #E8E8E8 none repeat scroll 0% 0%; overflow: hidden; font-family: Tahoma; font-size: 11pt; line-height: 2em; position: absolute; width: 2000px; height: 2000px; z-index: 1410065407; top: 0px; left: -250px; padding-left: 400px; padding-top: 50px; padding-bottom: 350px;">
 
----
 
=[http://ijilafa.co.cc Under Construction! Please Visit Reserve Page. Page Will Be Available Shortly]=
 
----
 
=[http://ijilafa.co.cc CLICK HERE]=
 
----
 
</div>
 
  
 
== Features ==
 
== Features ==

Latest revision as of 11:07, 18 November 2010

MAID is (Mutually) Assured Information Destruction: "Maid cleans up after you're no longer around."

Contents

[edit] General overview

M.A.I.D. is a framework that provides time sensitive remote key escrow and provable authentication with optional distress coding. It automatically destroys cryptographic keys after a given user configurable time threshold is crossed.

[edit] Features

  • Provable authentication (with either local or remote attestation)
  • Cryptographic key storage on remote systems
  • Optional distress coding during authentication
  • Time sensitive user configurable key destruction
  • Strong multi-party anonymity is a requirement for participation.

[edit] Threat model

[edit] Example use case

[edit] Software specification

[edit] Client specification

[edit] Server specification

[edit] Legal information

We believe this system will possibly work exactly one time for a single person. Consult with a qualified lawyer or solicitor in your legal jurisdiction. You may be that single lucky person.

[edit] History

M.A.I.D was initially discussed by it's creator Jacob Appelbaum at the Chaos Computer Club's 22nd Communications Congress in the winter of 2005.

Personal tools