Cryptography We Rely Upon
Think AI tools aren’t harvesting your data? Guess again https://www.linkedin.com/posts/erik-prince-ab714365_think-ai-tools-arent-harvesting-your-data-activity-7075838301043101696-vMPE
Solid cryptography, whether conventional or post-quantum, depends on and contributes to solid identity assurance. And, solid identity assurance depends on and contributes to solid cryptography, conventional or post-quantum.
However mathematically strong, the security that cryptography provides is not above the identity security of the people who hold a decryption key, while our identity solution would not exist without good hash algorithms like Sha-256 and Argon2.
Should someone be interested in what we are doing in the sphere of cryptography-supported and volition-enabled identity assurance, they might hopefully be interested to have a glance at this article, which is also our latest technology white paper — “Mnemonic Gateways as Leading Digital Identity App” (updated 5June2023) https://www.linkedin.com/pulse/mnemonic-gateways-leading-digital-identity-app-hitoshi-kokumai/
You will be re-discovering the power and value of your own episodic memory, say, non-volatile memory of your emotion-coloured pleasant personal experiences, as the seed of your secret credentials. It also keeps supporting the effectiveness of cryptography in the real world for long.
Thanks to Stiepan Aurélien Kovac for bringing me to this discussion.