Moving Towards A Tokenized World For Trusted Access Rights

Like it or not, we are moving to a tokenized world, and where we pass tokens which are trusted to provide further information. This might relate to a login token for a corporate infrastructure, and where an access token can be passed to give rights to applications and files. The tokens themselves — if designed properly — will not actually reveal sensitive information (such as passwords and login IDs). If a token is signed with the private key of a trusted entity, we know that we can trust the token.

--

--

--

This publication brings together interesting articles related to cyber security.

Recommended from Medium

Introducing Dango.Cafe — DeFi leverage simplified

OPENSEA EXPLOIT: MINTABLE RECOVERS AZUKI NFTS

MetaTravelers Cypher Puzzle #1

Get to the Drop Zone!

My Digital Presence

Locking Down my Digital Identity

The Easy Way To Create Good Passwords

Battle of Guardians IDO Process on SolRazr

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

What Makes Elliptic Curve Cryptography So Good? … Montgomery’s Ladder

Proving a Number Is In A Given Range Without Revealing The Number: Meet Bulletproofs