<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by NuID on Medium]]></title>
        <description><![CDATA[Stories by NuID on Medium]]></description>
        <link>https://medium.com/@NuID?source=rss-ae1c4393b2b5------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*rgJaOl_-PF57uz2ZmtOWRQ.jpeg</url>
            <title>Stories by NuID on Medium</title>
            <link>https://medium.com/@NuID?source=rss-ae1c4393b2b5------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Mon, 23 Mar 2026 14:21:08 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@NuID/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Let’s Talk Authentication, The Frequency Illusion, & Identity Utility]]></title>
            <link>https://medium.com/@NuID/lets-talk-authentication-the-frequency-illusion-identity-utility-dc5894ff27e5?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/dc5894ff27e5</guid>
            <category><![CDATA[zero-knowledge-proofs]]></category>
            <category><![CDATA[digital-identity]]></category>
            <category><![CDATA[authentication]]></category>
            <category><![CDATA[decentralized-identity]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Tue, 29 Mar 2022 20:47:05 GMT</pubDate>
            <atom:updated>2022-03-29T20:47:05.130Z</atom:updated>
            <content:encoded><![CDATA[<p>This piece is originally published on the NuID blog, <a href="https://blog.nuid.io/identity-utility-on-the-web/">The Nus</a>.</p><p><strong>Have you ever heard of the frequency illusion, where once you notice something once, you seem to suddenly notice it everywhere?</strong> It’s also called the Baader–Meinhof phenomenon, and it’s been ruling my life since joining NuID.</p><p>I’m seeing content &amp; having off the cuff conversations about the woes<em> </em>of logins and credentials more so than I ever would have anticipated. <em>Well Carlyle, </em>you think, <em>that must be because you changed industries – of course you’re going to see and hear about the thing you do for work. </em>That’s a good observation, and a correct one. Naturally the media and conversations I consume will closely align with my area of work. However that doesn’t account for, say, Spotify <a href="https://variety.com/2022/digital/news/spotify-down-access-issues-1235199002/">locking me out of my account</a> moments before a 3 hour flight, or a close college friend spontaneously complaining about the inconvenience of MFA at work.</p><p>The truth is, issues with authentication are everywhere, all the time, and people’s complaints are constant (and valid). I’m just recently internalizing and processing these events because they pertain to me and my efforts within NuID. This phenomenon is called the frequency <em>illusion </em>for a reason: the newly perceived frequency has always been there, just lying unnoticed on the periphery of consciousness.</p><p>What seemed like one-off annoyances in managing my accounts in the past are actually a systemic issue with threads connecting to every facet of our online identities: forgetting passwords, resetting passwords, being locked out of accounts, maintaining an endless password list, platforms’ customer support being utterly unhelpful; I could go on. If you start to observe, you’ll notice the same thing if you haven’t already. It’s not just you whose Netflix password you <em>swear </em>you typed in correctly but it only works on the third try. It’s not just you who watches warily when another of your Instagram followers gets hacked and <a href="https://www.idtheftcenter.org/post/itrc-bitcoin-scams-lead-to-hacked-instagram-accounts/">starts shilling Bitcoin</a>.</p><p>We use the internet constantly. It governs huge portions of our work, our socialization, and our education. Some platforms aim for us to <a href="https://www.polygon.com/22959860/metaverse-explained-video-games">have quasi-lives in it</a>. How is it, then, for something so seemingly sophisticated, so omnipresent in our lives, that it can be <em>so dang hard </em>to access and manage?</p><p>Passionate communities and companies want to tackle these issues, which is fantastic, but it can be hard to cut through the noise and the “hype” of what’s being promised. When people start talking about a “decentralized internet” or “web3” it can be easy to lose the thread of what the community is trying to achieve and how it will actually benefit people. Those concepts can get a bit nebulous. What NuID is working toward is <strong>Identity Utility on the internet</strong>. Let’s unpack that a bit.</p><p>For most of us, our utilities provide a crucial function in our daily lives, but we don’t give too much thought to how<em> exactly </em>they work. I have a rudimentary understanding of how power enters my home, but I’m certainly not thinking about it when I flip the lights on in the morning. I flip a switch, they come on as expected, and I proceed about my day. Same goes for the gas that heats my shower, or the water that washes my dishes. My utilities make my life easy, I expect them to work efficiently, and I don’t have to spend too much time thinking about them; even my bills are on autopay.</p><p>Identity on the internet should be the same: usable, useful, reliable, portable, and convenient (not to mention secure). If you show up at a bar, you should be able to quickly and easily verify you’re 21+ without also sharing a physical ID with your full name, home address, and full birthday as we do now.</p><p>A decentralized web is one in which individuals are the owners of their digital selves; they don’t have to trust platforms with their sensitive data like passwords, and they control who accesses what information. In order to make that a reality, it has to be built for<em> everyone to use</em>. And based on the frequency of complaints about the current model of identity on the internet, <em>everyone should want to use it</em>.</p><p>I would love to to never see another “reset password” email in my inbox again. When I move I would love to update my address once and have it propagate across platforms I care about. I would love to never receive a message like the one below that Locke received from Microsoft (how can you not reset a password to your own account when you’re the admin?!).</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*342jmwGxRiG7mJ_N4DkdBg.png" /></figure><p>We have a ways to go before true Identity Utility is implemented, but we have to start somewhere. Fortunately, NuID has been grinding away, head down, building the foundation for such a thing. It started with our <a href="https://nuid.io/solution.html">trustless authentication protocol</a>, and it’s continuing with the development of the NuWallet &amp; KiiChain. We aim to be the utility company for identity.</p><p>Identity Utility on the internet is not just possible, it’s happening, and we’re building it. We hope you’ll join us on the journey to bringing it to fruition. I’m energized and honored to play some small part of this effort, not just for my own benefit, but for the benefit of us all. If you start noticing your own woes with authentication and account management, drop me a line, and we can commiserate together (but rest assured- we’re working to fix it).</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=dc5894ff27e5" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Top 5: NuID 101 at RSA 2020]]></title>
            <link>https://medium.com/@NuID/top-5-nuid-101-at-rsa-2020-3dcc68923cf5?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/3dcc68923cf5</guid>
            <category><![CDATA[rsac]]></category>
            <category><![CDATA[ssi]]></category>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[rsa]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Mon, 10 Feb 2020 16:39:57 GMT</pubDate>
            <atom:updated>2020-02-10T17:34:21.294Z</atom:updated>
            <content:encoded><![CDATA[<p>It’s just two weeks out from the mega-event that is the RSA Conference. You, along with over 40,000 other security professionals and technologists, have (hopefully) squared away your travel plans and cleared your calendar. The last thing left to do is sift through the 24 topics and tracks containing dozens of sessions over six days of talks to build your own personalized agenda… Good luck!</p><p>To help lighten your analysis paralysis, we’ve put together a “NuID 101” mini-agenda with five RSAC sessions that touch on topics near and dear to us, like password storage, the future of authentication, cryptography, and decentralized identity.</p><p>Check out these five sessions to gain a better understanding of some of the challenges and innovations in authentication and digital identity today-and then stop by our booth #20 in the Early Stage Expo to chat about them!</p><h4><a href="https://www.rsaconference.com/usa/agenda/guidance-for-password-management-and-securing-it-in-storage">Guidance for Password Management and Securing It in Storage</a></h4><p>This may seem like a strange session for a team that gives out t-shirts with “Stop. Storing. Passwords.” on the back to suggest.</p><p>While yes, our answer on how to meet the “increased pressure on storing a password securely” is simply not to, in this session Hoyt Kesterson will break down exactly why common password storage practices simply aren’t enough. And if your organization hasn’t yet made the transition to <a href="https://nuid.io/#/solution">trustless authentication</a>, Keterson’s guidance on password storage is sure to be some of the best available (if you’re reading this Hoyt, we would be honored to contribute to that guidance!).</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*cFH7rmgZOLBKGLNa" /></figure><h4><a href="https://www.rsaconference.com/usa/agenda/follow-the-money-the-link-between-passwords-and-terrorism">Follow the Money: The Link between Passwords and Terrorism</a></h4><p>After hearing from Keterson about the weaknesses of existing password-based authentication methods, this talk by Trusona founder Ori Eisen and Frank Abagnale of real-life “Catch Me If You Can” fame, will really hammer home the scale and severity of the password-breach problem.</p><p>Eisen and Abagnale’s illumination of the national security implications of password breaches is just one aspect of a broader phenomenon that our CTO <a href="https://blog.nuid.io/enterprise-overflow-drowning-in-credential-data-breaches/">wrote about last year</a>. Nolan pointed out that passwords are not just a weak link in any particular organization, but are in fact a systemic vulnerability that transcends and interconnects otherwise unrelated organizations-something he coined “Enterprise Overflow.”</p><h4><a href="https://www.rsaconference.com/usa/agenda/password-strengthening-and-secure-computation">Password Strengthening and Secure Computation</a></h4><p>Moving on to a talk that is a bit more optimistic, in Topic 1 of this two-part session cryptographers Nigel Smart and John Kelsey will present their Ticket-Mediated Password Strengthening (TMPS) technique, which they published in <a href="https://eprint.iacr.org/eprint-bin/getfile.pl?entry=2019/543&amp;version=20190522:085419&amp;file=543.pdf">a paper</a> last year.</p><p>TMPS is a creative approach to addressing the risks of server-side password database compromise. With TMPS, rather than sending the user’s password to a server, it is used to derive a cryptographic key on their device and, through interacting with an authentication server, a set of one-time-use “tickets” that must be expended in each authentication attempt.</p><p>The server never learns anything about the user’s password, so a server-side breach does not lead to the Enterprise Overflow problem of existing password storage. Furthermore, because authentication attempts (and therefore password guessing attempts by an attacker) must be accompanied by an unused ticket, a would-be attacker is extremely limited in their ability to use common dictionary or brute force guessing strategies.</p><p>The practical viability and tradeoffs of TMPS are worth considering. Regardless, we think this is a great talk to attend to get thinking about new cryptographic approaches to password-based authentication.</p><h4><a href="https://www.rsaconference.com/usa/agenda/managing-self-sovereign-identities-a-relying-party-perspective">Managing Self-Sovereign Identities: A Relying Party Perspective</a></h4><p>Self-sovereign identity (SSI)-essentially synonymous with decentralized or blockchain-based identity-is the concept of a digital representation of identity which is decoupled from and not controlled by any centralized entity. For a better understanding, check out Christopher Allen’s formative article <a href="http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html">The Path to Self-Sovereign Identity</a>.</p><p>NuID was founded on the mission to return data ownership to the individual. Self-sovereign identity is core to that mission and we have been <a href="https://blog.nuid.io/nuid-daml/">working</a>, and <a href="https://blog.nuid.io/passwords-privacy-identity/">talking</a> about it from <a href="https://blog.nuid.io/hello-from-nuid/">the beginning</a>.</p><p>This session with Verizon’s George Fletcher will provide a valuable perspective on the real-world adoption of SSI. Not only is Fletcher a veteran of the identity standards world, he will be able to share learnings from within a large legacy organization-a less common perspective in the cutting-edge space of SSI.</p><h4><a href="https://www.rsaconference.com/usa/the-experience/innovation-programs/launch-pad">RSAC Launch Pad</a></h4><p>This last session is not actually a session, but we still think you should put it on your agenda! Launch Pad is RSA’s early-stage startup pitch event, where the top new security companies pitch their product to VC-judges and the RSA audience.</p><p>This event is special to us because last year NuID was selected to participate in the first-ever RSAC Launch Pad! You can see Ethan’s pitch on the <a href="https://www.rsaconference.com/usa/the-experience/innovation-programs/launch-pad">Launch Pad event page</a>.</p><p>The companies participating in Launch Pad this year may not strictly fit into a NuID 101 curriculum, but there’s no better place to learn about the future of security than from the teams who are out there building it.</p><p>Plus, the Launch Pad stage is right next to the Early Stage Expo where our kiosk will be, so you can stop by after the event and graduate to the NuID 200 level course!</p><p>If you’re interested in meeting at the event, <a href="mailto:info@nuid.io">shoot us an email</a> or visit our <a href="https://nuid.io/#/contact">contact page</a>.</p><p><em>Originally published at </em><a href="https://blog.nuid.io/the-nuid-101-agenda-at-rsa-2020/"><em>https://blog.nuid.io</em></a><em> on February 10, 2020.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3dcc68923cf5" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Welcoming BJ Neilsen to NuID!]]></title>
            <link>https://medium.com/@NuID/welcoming-bj-neilsen-to-nuid-aa55a7e721bb?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/aa55a7e721bb</guid>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[startup]]></category>
            <category><![CDATA[hiring]]></category>
            <category><![CDATA[blockchain]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Tue, 04 Feb 2020 17:30:32 GMT</pubDate>
            <atom:updated>2020-02-10T16:50:23.644Z</atom:updated>
            <content:encoded><![CDATA[<p>As a small team, nothing is more exciting and impactful than bringing on a new hire. We recently had the pleasure of doing just that with the addition of BJ Neilsen as a Senior Engineer! BJ joins us from sunny St. Augustine Florida, and has already become an integral part of our development efforts in the three short weeks since he joined the team.</p><p>Some of you may be aware that we like to write <a href="https://blog.nuid.io/tag/team/">welcome posts</a> whenever someone joins the team. This time, we decided to do it a bit differently and asked BJ to answer a few questions about himself, so you can get to know him from the source.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/600/0*vkWWZk2Lzj1U_BRh.png" /></figure><h4><strong>So, BJ, tell us a little about yourself.</strong></h4><p><em>I grew up in Utah and fell in love with the mountains and being active outdoors. My wife and I married 15+ years ago and we have 5 wonderful kids. We sold most of everything we owned in 2017 and traveled to 11 countries. Afterward we moved to Florida for a change of scenery. I fell into software development by accident 17 years ago when the guy next to me at work started teaching me to code. I became totally obsessed with building sites and apps, and that hasn’t really worn off even to this day.</em></p><h4><strong>Do you have any hobbies outside of software development?</strong></h4><p><em>Too. Many. To. Count. I fell deeply in love with rock climbing in the Utah mountains (I have a rock wall in my garage because Florida doesn’t have any cliffs to speak of). I love travel, hiking, camping, playing soccer, rooting for Real Salt Lake, building and playing guitars, playing piano, skateboarding, snowboarding, surfing, Taekwondo, riding motorcycles, attending musical theater, learning new programming languages, and on and on.</em></p><h4><strong>Can you share some of the what and why of your career so far?</strong></h4><p><em>I love building products that provide real value to people, something that solves a fundamental problem in their life. I get excited about the process of software development as well, always trying to simplify the process to the most essential parts, while ensuring that the end goal is always improvement in the lives of the people using our software.</em> <em>I have something inside me that pushes me to Make Things™. I have so many hobbies I have to be selective about where I spend my time. In the software world I just gain so much satisfaction out of creating something useful for people to use and enjoy.</em> <em>In my last role I was the Director of Engineering at Bitt, a Barbadian startup building a Central Banking Digital Minting platform backed by blockchain. Before that I was a principal engineer at Kuali, building a next-generation student enrollment platform for higher education.</em> <em>Previously, I built and maintained the most popular Ruby protobuf library used by companies like MX and Square.</em></p><h4><strong>How would you explain your role at NuID?</strong></h4><p><em>I’m joining the team to iterate on the NuID platform, adding user features alongside platform improvements. We’re currently investigating ways to deeply leverage Clojure’s spec library to provide greater stability, introspection, and auditability of our platform. The potential has me so excited for NuID’s future.</em></p><h4><strong>Hit us with some random facts about yourself.</strong></h4><ul><li><em>I once nearly lost an eye playing in the backyard. A few months after the accident the eye that wasn’t damaged changed color from green to brown. The other eye is still green like it was before. ¯\_(ツ)_/¯</em></li><li><em>I once placed 3rd in a “dance competition” at a huge youth conference when I was 15. I had not ever danced before that night, and haven’t since. I was also wearing bright purple Adidas tear-away pants, so maybe that’s why the judges loved me.</em></li><li><em>I broke my elbow because I ran over a dead cat on my road bike and crashed.</em></li><li><em>I’ve broken my skull, elbow, collar bone, several fingers and toes, and torn my ACL.</em></li></ul><h4><strong>Anything else you want to add?</strong></h4><p><em>It feels like an understatement to say I am so excited to join the NuID team. I’ve been so inspired by the quality of work you’ve been doing in the zero knowledge/trustless authentication space, I can’t wait to dig in!</em></p><h4>Interested in joining the team and returning data ownership to the individual? Check out our <a href="https://blog.nuid.io/tag/hiring:open/">open positions</a>!</h4><p><em>Originally published at </em><a href="https://blog.nuid.io/welcoming-bj-neilsen-to-nuid/"><em>blog.nuid.io</em></a><em> on February 4, 2020.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=aa55a7e721bb" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Decentralized Identity On the Big Stage at Gartner IAM Summit]]></title>
            <link>https://medium.com/@NuID/decentralized-identity-on-the-big-stage-at-gartner-iam-summit-2b2141c74a04?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/2b2141c74a04</guid>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[gartner]]></category>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[decentralized-identity]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Wed, 27 Nov 2019 05:54:00 GMT</pubDate>
            <atom:updated>2019-12-04T16:02:48.355Z</atom:updated>
            <content:encoded><![CDATA[<p>Next month nearly two thousand CIOs, CISOs, IAM practitioners, and other technology leaders will gather in Las Vegas at the <a href="https://www.gartner.com/en/conferences/na/identity-access-management-us">Gartner Identity and Access Management Summit</a>. Granted, there are probably more exciting events that take place in Vegas, but the Gartner IAM Summit is perhaps the most significant event on the annual digital identity conference circuit.</p><p>That claim is particularly true for Gartner’s market sweet spot of major enterprises. Gartner counts 74% of Fortune 500 companies among its clients, and over half of the IAM Summit attendees represent businesses with over 20,000 employees. The point being: Gartner has the ear of digital identity leaders from many of the world’s largest enterprises.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*s9KeoVPIaFGQrCHmTA-6eA.png" /></figure><p>Which is why it’s exciting and encouraging that one of the five tracks at this year’s event will highlight decentralized identity. Although the topic of decentralized identity has attracted increasing attention in the past several years, its inherent nature as something that is, well, <em>decentralized</em>, has so far meant that the most active proponents have been consortiums and open communities like the <a href="https://identity.foundation/">Decentralized Identity Foundation</a> and <a href="https://www.w3.org/TR/did-core/">W3C</a>, as well as new startups like NuID (and many others). However, the prominence of decentralized identity at Gartner’s IAM Summit this year marks a new phase of enterprise exploration, which we think will be followed by adoption in the next few years.</p><p>The “Multifactor Authentication and Decentralized Identity” track at Gartner IAM will include an “Ask the Expert” session with Gartner analyst David Mahdi, who recently co-authored a 2019 <a href="https://www.gartner.com/doc/3941907">research paper</a> (paywall) on the prospect of enterprise adoption of decentralized identity, which stated that “security and risk management leaders must focus on increasing readiness for future adoption of decentralized identity.”</p><p>The “Guidance for Decentralized Identity Adoption” session with analyst Homan Farahmand promises to present three example use-cases of decentralized identity in the enterprise environment. Homan has been researching decentralized technologies, and specifically identity, for several years, and wrote the definitive Gartner report <a href="https://www.gartner.com/doc/3876011?ref=AnalystProfile&amp;srcId=1-4554397745">Blockchain: The Dawn of Decentralized Identity</a> (paywall).</p><p>This year has already seen the first steps taken towards decentralized identity by old-guard behemoths like <a href="https://www.microsoft.com/en-us/security/technology/own-your-identity">Microsoft</a> and <a href="https://newsroom.mastercard.com/press-releases/mastercard-introduces-consumer-centric-model-for-digital-identity/">Mastercard</a>. And while its unsurprising that companies that see a role for themselves as technology and service providers in a new decentralized landscape have made some of the first moves, Gartner’s research publications and event content are aimed at businesses that will be looking to adopt, consume, and integrate decentralized identity solutions into their line of business applications. And adoption by these services-banks, insurance companies, e-commerce, etc.-would bring decentralized identity to the truly big stage of global adoption.</p><p>Of course, (shameless plug warning) there’s no better source to learn about decentralized identity than from people who are working to build the ecosystem! We <a href="https://blog.nuid.io/nuid-daml/">launched a partnership</a> earlier this year with the DAML enterprise smart contracts team of Digital Asset to make our trustless authentication and decentralized identity solution more easily available to enterprises.</p><p>Our team will be at Gartner IAM at booth #431 and would love to hear from you if you have questions or thoughts about decentralized identity. You can also reach out at <a href="mailto:info@nuid.io">info@nuid.io</a> to schedule a time to stop by.</p><p>You can also use our discount code of IAMSP46 to save $350 off the full registration price.</p><p><em>Originally published at </em><a href="https://blog.nuid.io/decentralized-identity-on-the-big-stage-at-gartner-iam-summit/"><em>https://blog.nuid.io</em></a><em> on November 27, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=2b2141c74a04" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[NebulousAD v1.1 with k-Anonymity]]></title>
            <link>https://medium.com/@NuID/nebulousad-v1-1-with-k-anonymity-276930703a98?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/276930703a98</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[passwords]]></category>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[sysadmin]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Wed, 11 Sep 2019 22:15:13 GMT</pubDate>
            <atom:updated>2019-09-12T00:33:50.069Z</atom:updated>
            <content:encoded><![CDATA[<p>(skip straight to <a href="https://github.com/NuID/nebulousAD">GitHub</a>)</p><p>Last month <a href="https://blog.nuid.io/nebulousad/">we released</a> NebulousAD, a free tool for checking user credentials in Active Directory against more than 2.5 billion unique passwords that have been compromised in data breaches.</p><p>The tool was made with system administrators in mind. It’s available as a precompiled executable or can be built from source, it doesn’t require you to download and host terabytes of data, and it was designed to work well with SIEM tools and Windows Task Scheduler. You can watch Robert, our Director of R&amp;D, present NebulousAD at the BSides Las Vegas security event <a href="https://www.youtube.com/watch?v=xJgUdNfWbE4&amp;trk">here</a>.</p><p>Today we’re happy to announce an update to the <a href="https://github.com/NuID/nebulousAD">NebulousAD tool</a> that brings two important changes: improved documentation for the tool and API that will make getting up and running even easier, and support for the privacy-preserving k-anonymity model of checking password hashes.</p><h3>k-Anonymity</h3><p>We’re particularly excited about the k-anon support since privacy is at the core of <a href="https://blog.nuid.io/passwords-privacy-identity/">what we do</a>. Although we don’t log or store the hashes that are sent to the NebulousAD API, we’d much rather not even be able to if we tried. This is what k-anon enables.</p><p>We took inspiration from Troy Hunt’s <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords</a> service, which has been using k-anon to check breached passwords since early 2018. The model, which is <a href="https://blog.cloudflare.com/validating-leaked-passwords-with-k-anonymity/">explained in detail</a> by Junade Ali at Cloudflare, is simple in all the best ways.</p><p>Rather than sending an entire hash to our API to check if that exact hash shows up in our database, with k-anon only the first few characters of the hash are sent. This “hash prefix” will match not just one, but a set of hashes in our database that all happen to start with those characters (but then differ in their subsequent characters, since the hashes are all unique in full). The entire set of hashes from the database with a matching prefix are then sent to the client, where an offline check is performed to determine if the original hash matches any in the returned set.</p><p>Because we never receive the full hash, we don’t know if any of the hashes in the prefix-match set are actually the same as the one being audited by the client. And if there is a match (which we wouldn’t know), we also wouldn’t know which of the hundreds of hashes in the set it is.</p><p>NebulousAD uses a hash prefix length of five characters, and returns a minimum of 405 and maximum of 985 results for any valid five-character prefix. The pseudo-random nature of hashes makes it so that while hashes are distributed relatively evenly across all possible prefixes, there are variations which result in that range of response size.</p><p>As an example, the text “ilovemydog” has the SHA-2(NTLM) hash of:</p><blockquote><strong>be266</strong>46e1f96e05eca5ec4a7c1677012ab8cedd0a0704c5531569cb2c39d0dac</blockquote><p>The first five bolded characters “ <strong>be266</strong>” are the prefix. This is what would be sent from the client to our API. Querying this prefix against the Nebulous database results in 856 matches (this number may change as we add more data in the future). As mentioned above, we wouldn’t know which, if any, of the 856 hashes with the <strong>be266</strong> prefix match the original full hash (spoiler: in this case “ilovemydog” is definitely in Nebulous). All 856 matching hashes will be returned to the client, where the final check for a full match is made.</p><p>Using the k-anon model makes it significantly harder for us, or anyone who may be able to intercept your traffic, from gaining any useful information from monitoring your interactions with the Nebulous API.</p><h3>Getting started</h3><p>You can get started using NebulousAD by heading over to our <a href="https://github.com/NuID/nebulousAD">GitHub page</a>. As always, we welcome and encourage any questions or feedback at <a href="mailto:nebulous@nuid.io">nebulous@nuid.io</a>. If you have had a chance to try the tool, we would also appreciate if you could take a couple minutes to fill out <a href="https://forms.gle/SuHSRikL7h4S69fV9">this feedback form</a>.</p><p><em>Originally published at </em><a href="https://blog.nuid.io/nebulousad-v1-1-with-k-anonymity/"><em>https://blog.nuid.io</em></a><em> on September 11, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=276930703a98" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Hiring: Senior Full Stack Engineer]]></title>
            <link>https://medium.com/@NuID/hiring-senior-full-stack-engineer-4818a834762b?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/4818a834762b</guid>
            <category><![CDATA[clojure]]></category>
            <category><![CDATA[hiring]]></category>
            <category><![CDATA[startup]]></category>
            <category><![CDATA[blockchain]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Mon, 09 Sep 2019 15:00:00 GMT</pubDate>
            <atom:updated>2019-09-12T00:30:21.870Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/600/0*LOURZcc3s8Ww8Qfb.gif" /></figure><h3>About NuID</h3><p>NuID is building a next-generation authentication platform intended to simplify writing secure, privacy-preserving applications. Our solution, NuLogin, leverages zero knowledge proofs to eliminate the sharing of authentication secrets, and a distributed ledger to provide persistent, globally unique, and user-owned authentication credentials. NuLogin is the modern login box.</p><p>We are a seed-stage startup with backing from 8VC, Jemison Investment, and angel investors. You can see more about our team and advisors <a href="https://nuid.io/#/team">here</a>, and check out the rest of <a href="https://blog.nuid.io/">our blog</a> to get to know what we’re about.</p><p>We’re looking for a Senior Full Stack Engineer to help us drive product development across a broad range of domains. You will be a core part of a small team and play an integral role from ideation to implementation.</p><h3>The role</h3><p>You will be working closely with our CTO to design, build, and launch core functionality of the NuLogin product.</p><p>Some projects on our roadmap include: multi-factor authentication (mobile, push), enhancing and growing our developer portal, expanding NuLogin integration support to more languages/frameworks, identity-based threat intelligence tools, and privacy preserving features.</p><p>The technologies we use include:</p><ul><li>Clojure/ClojureScript</li><li>Datomic</li><li>AWS, Terraform</li><li>Serverless (Lambda, SNS, SQS, …)</li></ul><p>Experience is best when it’s shared. Familiarity with these technologies will help in finding your groove quickly, but isn’t a prerequisite for success at NuID. Comfort in both learning and teaching is essential.</p><h3>What we’re looking for</h3><p>We are looking for a generalist Senior Full Stack Engineer that will be able to take on a diverse set of challenges.</p><p>We are not looking to check boxes. The skills and experiences below should give you an idea of what would prepare you for this role, but aren’t hard requirements.</p><ul><li>5+ years of engineering</li><li>2+ years working with Clojure or other functional languages</li><li>Experience building authentication products or systems</li><li>Experience with and a passion for the startup environment</li><li>Familiarity with cryptography and security engineering</li><li>Previous work with privacy-first design</li></ul><h3>Fit</h3><p>We love what we do. We believe in craft. We’ve seen most of Rich Hickey’s talks. We’re still unsure whether worse is better. Culturally, we draw a lot of inspiration from Basecamp. Architecturally, we think simple is better than easy and we build for change.</p><p>You will be joining a small, distributed team and working on zero-to-one projects. Communication is paramount. We believe it should always be mindful, direct, and kind.</p><p>We emphasize strong ownership and collaboration in our day to day operation. You will drive architectural decision-making, inform product roadmap, and exercise initiative to support and improve the NuLogin ecosystem.</p><h3>More details</h3><p>We are looking to invest in an individual who is seeking opportunities to grow with NuID as a full-time team member. A contract-to-hire option would also be considered. We are flexible and would jump at the opportunity to bring on a mutually great fit.</p><p>Equity will be offered as part of total compensation. Full health, dental, vision, and life insurance are provided.</p><p>This role is based in NYC, but we are open to remote from the surrounding areas. Our founders are both in New York, but our team is spread across both coasts.</p><p>We always want the best ideas to win. To do that, we need a diverse set of ideas from a diverse team with different personal and professional backgrounds. We value new perspectives and identities that will help us build a stronger community.</p><h3>To apply, please send your resume and a brief message on why you’re interested and why would be a good fit to: <a href="mailto:ethan@nuid.io">info@nuid.io</a>.</h3><p><em>Originally published at </em><a href="https://blog.nuid.io/hiring-senior-full-stack-engineer/"><em>https://blog.nuid.io</em></a><em> on September 9, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4818a834762b" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Enterprise Overflow: Drowning In Credential Data Breaches]]></title>
            <link>https://medium.com/@NuID/enterprise-overflow-drowning-in-credential-data-breaches-7d19dfa5470?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/7d19dfa5470</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[passwords]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[privacy]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Fri, 23 Aug 2019 19:28:38 GMT</pubDate>
            <atom:updated>2019-08-23T19:28:38.556Z</atom:updated>
            <content:encoded><![CDATA[<p>In 1988, the relatively nascent internet experienced its first cyber worm. In just 24 hours, the <a href="https://www.fbi.gov/news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218">Morris worm </a>, named after its creator Robert Morris, spread to roughly 10% of the computers on its network and caused damages estimated to range from $100,000 to several million.</p><p>A formative event in internet history, the Morris worm was also the first real-world exploitation of a software vulnerability that would become ubiquitous in the hacker and computer security communities of the 1990s and early 2000s: the buffer overflow.</p><p>A buffer overflow is when a program attempts to write an input that is larger than the space of memory (the buffer) that has been designated for storing that input. The “overflow” portion of the input can spill out of the buffer and into memory that holds other information for the program. When used as a security exploit, that overflow can contain malicious code that changes the function of the program.</p><p>Buffer overflows “monopolized the headlines in the security research community” for decades (see a <a href="https://thinkst.com/resources/papers/BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf">comprehensive timeline </a>put together in 2010), and the closely related term “stack overflow” became the name of one of the most popular online developer communities.</p><h4>Enterprise Overflow</h4><p>Fast forward nearly a decade, and today’s mainstream headlines are also monopolized by a growing cyber threat.</p><p>Large-scale credential data breaches — when hackers gain access to a company’s database of usernames and passwords — have become commonplace. Notable examples just this year include , and . Even and have been in the headlines for not properly protecting passwords (though there was no evidence of unauthorized access at either company).</p><p>Verizon’s <a href="https://www.forbes.com/sites/jeanbaptiste/2019/05/11/cybercriminals-favor-targeting-top-executives-small-businesses-money-verizon-data-breach-report/#e05059a30e6c">annual breach report </a>counted over 2,000 data breaches in 2018, but since many breaches go undetected (or unreported), that number is likely <a href="https://www.csoonline.com/article/3396160/why-reported-breaches-are-the-tip-of-the-iceberg.html">much higher </a>. The same report also found that 81% of breaches involve the use of stolen or weak credentials.</p><p>Hackers have learned that because people often choose weak passwords and reuse them in multiple places, large lists of passwords from any particular website or company can prove to be useful at hundreds or thousands of others. John Doe’s password stolen from badsecurity.co might get an attacker into Mr. Doe’s bank account. Companies that are seemingly completely independent share a crucial security dependency: their users.</p><p>We have entered a state of “enterprise overflow.” With billions of internet users connecting to hundreds of thousands of websites and applications, the availability of breached passwords has reached a critical mass. The credentials stolen from some enterprises are overflowing into others, leading to a further cascading effect of breaches. Like Morris’s fateful worm, enterprise overflow has become a problem of systemic proportions, where every participant in the system is impacted by the security of its peers.</p><p>The comparison here between credential breaches and buffer overflows is, of course, metaphorical — and perhaps a bit of a stretch — but the point is hopefully illustrative of two things. The “overflow” of credential data from its intended domain has become an effective weapon for cybercriminals, and the problem of authentication is a defining security challenge of today.</p><h4>A Network Perspective</h4><p>The Morris worm demonstrated that the decentralized nature of the internet required collaborative approaches to security. In the <a href="https://www.zdnet.com/article/the-day-computer-security-turned-real-the-morris-worm-turns-30/">aftermath</a> of the incident, the Computer Incident Response Team Coordination Center ( <a href="https://www.sei.cmu.edu/about/divisions/cert/index.cfm#history">CERT/CC</a>) was <a href="https://www.cs.cmu.edu/link/morris-worm-turned">formed</a> as part of a non-profit called the Software Engineering Institute. CERT/CC has since been a crucial venue for research and coordination of internet-scale security across public, private and academic domains.</p><p>Today’s enterprise overflow problem will require a similar mindset and response. While the security industry has carried on a great tradition of open collaboration around research and disclosure of the vulnerabilities that may lead to breaches, we need to start viewing the breached data itself in the same way — at least when it comes to identity and authentication data. When passwords or other data are breached from one company that can directly be used to attack others, that data should be shared in a way that allows other companies to protect themselves, without violating individuals’ privacy or empowering would-be cybercriminals.</p><p>This is easier said than done. Exactly how this should be achieved is up for debate. The important point now is that we adopt a “network perspective” to credential data breaches. We need to view each new breach as a factor in the threat models of all organizations. Security teams should be asking themselves, “Do we trigger our incident response process when someone else gets hacked?”</p><p>Some efforts along this line of thinking have already been made by individuals and a few businesses. Troy Hunt’s <a href="https://haveibeenpwned.com/">Have I Been Pwned </a>(HIBP), and his related Pwned Passwords service, are great examples. Google has taken a similar step with its <a href="https://www.forbes.com/sites/leemathews/2019/02/07/this-must-have-google-chrome-add-on-alerts-you-when-your-passwords-have-been-compromised/#7df21b9f6062">Password Checkup </a>tool. By collecting breached data and making it available in various privacy-preserving ways, these services are connecting the dots between individual credential breaches and enabling users and business to respond to the changing breached-data landscape.</p><p>There are a host of promising technologies in the authentication space that may one day make enterprise overflow obsolete. But solving such large and collective problems take time, and there is still a lot we can do today with technology that is already in place. Recognizing that credential data breaches are in fact a collective problem — adopting that network perspective — is a step that we can take now while we build the solutions of tomorrow.</p><p><em>Originally published at </em><a href="https://forbes.com/sites/forbestechcouncil/2019/07/31/enterprise-overflow-drowning-in-credential-data-breaches"><em>https://www.forbes.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7d19dfa5470" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[NebulousAD: A Free Credential Auditor for Active Directory]]></title>
            <link>https://medium.com/@NuID/nebulousad-a-free-credential-auditor-for-active-directory-6e1520eadc3a?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/6e1520eadc3a</guid>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[active-directory]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[passwords]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Wed, 14 Aug 2019 20:09:27 GMT</pubDate>
            <atom:updated>2019-08-14T20:24:29.753Z</atom:updated>
            <content:encoded><![CDATA[<p>(skip straight to <a href="https://github.com/NuID/nebulousAD">GitHub</a>)</p><p>Storing passwords is a problem. And while we’re working on eliminating the need for passwords to be shared or stored anywhere, we know this problem isn’t going away overnight.</p><p>In the meantime, one of the most effective ways we can break the cycle of hackers using stolen passwords to breach accounts and companies-thereby arming themselves with even more stolen passwords-is to prevent people from using passwords that are already in the hands of attackers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/512/1*2UrP4nS5D7l-ytkGzy2wfA.png" /><figcaption><a href="https://xkcd.com/2176/">https://xkcd.com/2176/</a></figcaption></figure><p>NIST recommended exactly that in their long-awaited update to their digital identity guidelines. Released in 2017, the <a href="https://pages.nist.gov/800-63-3/sp800-63b.html">800–63B</a> publication recommends doing away with all complexity rules, and opting instead for just a minimum length requirement (eight characters), and the use of password blacklists.</p><p><em>“When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, </em><strong><em>or compromised.</em></strong><em> For example, the list MAY include, but is not limited to:</em></p><ul><li><strong><em>Passwords obtained from previous breach corpuses.</em></strong></li><li><em>Dictionary words.</em></li><li><em>Repetitive or sequential characters (e.g. ‘aaaaaa’, ‘1234abcd’).</em></li><li><em>Context-specific words, such as the name of the service, the username, and derivatives thereof.”</em></li></ul><p>Last week we released a beta version of <a href="https://github.com/NuID/nebulousAD">NebulousAD</a> at the BSides Las Vegas security conference. This command line tool is meant to help system administrators implement breached password blacklisting with the most common enterprise user management system: Microsoft’s Active Directory.</p><p>NebulousAD makes it easy to securely check AD users’ passwords against a database of over <strong>2.5 billion</strong> unique passwords that have been found in data breaches over the past 10 years.</p><p>You can watch Robert’s talk at BSides about the problem of breached credentials and the NebulousAD tool <a href="https://www.youtube.com/watch?v=xJgUdNfWbE4">here</a>.</p><h3>NebulousAD</h3><p>At a high level, NebulousAD has three functions:</p><ol><li>Extract user passwords from an AD domain in their native NTLM hash format and output them into a csv or json file (for this step we use the popular <a href="https://github.com/SecureAuthCorp/impacket">Impacket tool</a>).</li><li>Wrap the NTLM hashes in a more secure SHA-2 hash.</li><li>Submit the SHA-2(NTLM(password)) hashes to our API, which queries our database of breached passwords and returns a YES/NO status for each hash depending on if a match was found.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/432/0*cvwuoE3xEuhVTXRG" /><figcaption>Screenshot from the tool.</figcaption></figure><p>The result is a list of the users in your domain that are using passwords that have shown up in other data breaches, allowing you to inform those users and/or force a password reset.</p><p>We require users to <a href="https://nebulous.nuid.io/#/register">register an account and API key</a> before hitting our API. This is done primarily to enforce rate limiting and to keep an eye on any potentially abusive behavior. While we do collect aggregate performance metrics, we do not store or log the hashed passwords sent to the API.</p><p>You can read more about the tool and take a look at the code on <a href="https://github.com/NuID/nebulousAD">GitHub</a>. The current v1.0.0 is a pre-release, but we will be working to further polish up the tool to make it more accessible and expand functionality. We would love to hear feedback and requests from early adopters, so please do go take a look and let us know what you think!</p><h3>The Nebulous data</h3><p>NebulousAD was built to take advantage of a breached credential database we have been working on for over a year.</p><p>We started collecting breached credentials from public and dark web sources with the intention of conducting research on password usage, and integrating a password blacklisting functionality into our authentication product, <a href="https://docsend.com/view/8pdt3vc">NuLogin</a>. Leaning on the offensive security experience of our team, we found that we were able to put together a collection of breached credentials that was larger than any other single source we have encountered.</p><p>The database, which we refer to as Nebulous, currently contains over 8 billion records from more than 7,500 individual breaches going back to 2009. There are almost 4 billion individual plaintext passwords in Nebulous, of which about 2.5 billion are unique. There are also around 3 billion hashed passwords that we have not yet attempted to crack.</p><p>We continually search for new data as it becomes available and add it to Nebulous. Our approach is to focus on the latest breaches that include new and unique passwords. These credentials are the most valuable to attackers since they are more likely to still be in use, which makes them the most important ones to be blocking.</p><h3>Why we built this</h3><p>Other commercial and free tools exist to help filter user credentials, with the most well-known example being Troy Hunt’s <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords</a>. These are great options, and we highly encourage people to take advantage of whatever credential blacklisting methods are available to them.</p><p>We decided to build our own partly because we found that our Nebulous database far exceeded the record count of other available options. For example, we have about five times more searchable unique passwords than the current Pwned Passwords version. As our CTO explained in a recent <a href="https://www.forbes.com/sites/forbestechcouncil/2019/07/31/enterprise-overflow-drowning-in-credential-data-breaches/#736c15ae1506">Forbes article</a>, we think breached data needs to be more widely shared and used by the security community-a “fight fire with fire” approach. So, naturally we wanted to make our massive Nebulous database useful to people defending enterprise networks.</p><p>We also felt that there was room for improvement in credential blacklisting tools built specifically for use with Active Directory. AD system administrators have a different set of threats, priorities, and restrictions compared to developers of consumer-facing applications. Plus, even a single set of compromised employee credentials can have an outsized impact if they lead to an entire network being breached.</p><p>NebulousAD is easily integrated with SIEM and syslog tools, and it can be run with Windows Task Scheduler for a “set it and forget it” flow. This would allow a system admin to automate periodic checks with NebulousAD to make sure that employee credentials are not compromised on an on-going basis. And of course since the tool is open source, users can create their own extensions and scripts that expand the usefulness for their company.</p><h3>Future plans</h3><p>As mentioned above, the current version of NebulousAD is a pre-release that we made available as part of Robert’s presentation at BSides. It is fully functioning and has been tested by our team for bugs, but it is also in need of further usability testing and feedback, as well as a bit of polish. We encourage people to go take a look, grab a key, and let us know how your experience is-we appreciate any comments or questions! ( <a href="mailto:info@nuid.io">info@nuid.io</a>)</p><p>Some items on the immediate release plan include comprehensive API and user wiki documentation, the ability to redact specific users or groups from what is sent to the API, and a facelift for our API key registration portal.</p><p>Another important update that will be coming is the addition of a more private method for checking credentials with the NebulousAD API. Even though we do not log the contents of requests, we understand that some people may not want to send hashes over the network to us. We plan to adopt the k-anonymity protocol that is used in Troy Hunt’s project so that we never see full hashes. We’ll get into this further with that update, but for now you can also check out a <a href="https://blog.cloudflare.com/validating-leaked-passwords-with-k-anonymity/">great post</a> from Junade Ali at Cloudflare, who proposed the k-anon system for Pwned Passwords.</p><p>Finally, we decided to release this as a free open source tool to help advance the practice of password blacklisting and make our Nebulous database useful to the security community. While we want to preserve that goal, we are leaving open the possibility that a paid version or functionality could be introduced in the future if there is demand for further growth of the tool. This would most likely take the form of a usage cap for the free version, or premium functionality like automated remediation. In any scenario, we are dedicated to making this tool available to as many people as possible, including those who would be unable to pay for it.</p><p><em>Originally published at </em><a href="https://blog.nuid.io/nebulousad/"><em>https://blog.nuid.io</em></a><em> on August 14, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6e1520eadc3a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Behavioral Biometrics: The Next Step in Digital Identity?]]></title>
            <link>https://medium.com/@NuID/behavioral-biometrics-the-next-step-in-digital-identity-1fadb4a8e6d6?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/1fadb4a8e6d6</guid>
            <category><![CDATA[authentication]]></category>
            <category><![CDATA[biometrics]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[infosec]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Mon, 15 Jul 2019 13:03:00 GMT</pubDate>
            <atom:updated>2019-07-15T17:19:14.424Z</atom:updated>
            <content:encoded><![CDATA[<p><em>Guest post by Jensen Bjorn.</em></p><p>Most people are familiar with biometric security in terms of fingerprint scanning and facial recognition, as these are the most common forms of biometrics available today. While these physical attributes are difficult to replicate and bypass, they are still singular parameters or factors, which means that it’s only a matter of time before the average hacker can get through the basic biometric firewall.</p><p>Enter behavioral biometrics: sensors and algorithms calibrated towards consistently analyzing thousands of biometric parameters like your gait, typing habits, and the like, instead of just one-off notifications. Powered by advances in artificial intelligence (AI) and the Internet of Things, behavioral biometrics might just be the next big leap in mainstream digital identity authentication.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/816/0*Dq-z3vNebFIQJmHw.png" /></figure><p>Info Security Magazine <a href="https://www.infosecurity-magazine.com/news/natwest-implements-behavioral/">lists the features </a>of behavioral biometrics available right now in leading banks: cutting-edge detection strategies can recognize hand-eye coordination, pressure, navigation, scrolling, and other movements to create a unique user profile. This allows banks to continuously ascertain whether online activity is expected, irregular, or certain characteristics are linked to malicious activity. At the user end, this translates to a reduction in unnecessary escalations, as they don’t have to worry about being contacted by their bank if it is a false alarm. This ultimately provides both parties a fraud-free and seamless user experience.</p><p>Given its potential value to the world’s largest digital networks and vital industries, it should also be noted that behavioral biometrics are still somewhat in their early stages. While consistently analyzing the digital life cycle is a step in the right direction, <a href="https://threatpost.com/biometrics-in-2019-increased-security-or-new-attack-vector/140683/">ThreatPost indicates</a> that there are many other improvements that behavioral biometrics are yet to disrupt. This includes collecting data on mouse movements, keystrokes, scroll feed, and preferred methods of input. When you consider the mobile smartphone’s capabilities, there’s also accelerometer and gyroscope data, as well as touchscreen interaction patterns. The more parameters and data to be analyzed and authenticated, the greater the individual and organizational security.</p><p>But at the same time, this can lead to yet another cybersecurity paradox: while more data means more parameters for detecting and stopping malicious activity, increased data collection can all too easily lead to greater vulnerability from all sides. Hackers are constantly sniffing around digital networks for weaknesses, and large-scale biometric databases make for highly profitable potential targets. If behavioral biometrics are to be applied in mainstream networks, the organizations that use them need to be able to ensure the security of their data through both defensive and offensive techniques-not to mention get their customer base to agree to being data-mined.</p><p>Privacy-preserving authentication protocols like NuID’s zero knowledge authentication could become an important piece to navigating this security vs. privacy tradeoff presented by behavioral or other biometrics. Today, biometric authentication has to be done entirely on the user’s device, like with Apple’s FaceID, or it involves centralized storage of biometric data. Further research will need to be done to see if the asymmetric cryptography used in zero knowledge authentication can be effectively applied to biometric data, allowing for “remote” biometric authentication without centralized storage of sensitive data. For now, biometrics can be safely used on the user’s device to then unlock a static key that is used in zero knowledge authentication.</p><p>Whether or not behavioral biometrics will benefit mainstream digital identity authentication on a mass scale remains to be seen. What’s sure is that this potentially disruptive technology is worth further exploration and experimentation.</p><p><em>Originally published at </em><a href="https://blog.nuid.io/the-next-step-in-digital-identity/"><em>https://blog.nuid.io</em></a><em> on July 15, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1fadb4a8e6d6" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bringing decentralized identity to the enterprise with DAML]]></title>
            <link>https://medium.com/@NuID/bringing-decentralized-identity-to-the-enterprise-with-daml-e0ad266102fe?source=rss-ae1c4393b2b5------2</link>
            <guid isPermaLink="false">https://medium.com/p/e0ad266102fe</guid>
            <category><![CDATA[daml]]></category>
            <category><![CDATA[authenticity]]></category>
            <category><![CDATA[enterprise-software]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[identity]]></category>
            <dc:creator><![CDATA[NuID]]></dc:creator>
            <pubDate>Tue, 02 Jul 2019 10:00:00 GMT</pubDate>
            <atom:updated>2019-07-02T16:19:26.898Z</atom:updated>
            <content:encoded><![CDATA[<p><em>by Ibrahim Pataudi, VP of Business Development</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HS4Ciw8lLC6FnPbRUeJJuQ.png" /></figure><p>User trust is harder than ever to earn and even easier to lose. Data breaches are commonplace and user privacy is threatened as a result.</p><p>How can we put the ownership of users’ digital identities back in their own hands and reduce the risks businesses currently face from centrally managing identities and authentication?</p><p>In this post I will outline how we are addressing this problem for the enterprise by integrating our trustless authentication solution, NuLogin, with <a href="https://daml.com/">DAML</a>, the smart contract language created by Digital Asset that will run on multiple blockchain platforms and cloud-native databases.</p><p>Authentication today is stuck in the <a href="https://blog.nuid.io/passwords-privacy-identity/">“shared secret” paradigm</a>: users are forced to share their authentication secrets (usually passwords, secret questions, and other information) with the services they use, and those services, in turn, take on the responsibility and liability of keeping those secrets safe. Unfortunately, because password databases are a prime target for cybercriminals, those secrets often don’t stay secret for long.</p><p>In addition, there is no way to ensure that security best practices are being implemented in the right way by these services. Nearly <a href="https://nuid.io/pdfs/solution-overview.pdf">40% of breaches compromise passwords</a>, and over 80% of attacks involve the use of stolen or weak credentials.</p><p>This centralized model of password storage also leads to a frustratingly fragmented user experience. With their identities locked in proprietary silos, users end up with dozens of login credentials and tend to make things easier for themselves by choosing easy-to-remember (weak) passwords, or storing them in easy to reach locations such as text files.</p><h3>Trustless authentication and decentralized identity</h3><p>At NuID, we are working to solve the shared secret problem by giving enterprises a way to authenticate their users without having to store their passwords, but critically, in a way that places ownership of digital identities with users. Moreover, we want to provide the authentication foundation for a broader identity framework in which user consent and privacy are at the core of our digital economy.</p><p>The NuLogin authentication service leverages zero knowledge cryptography to enable users to prove they know their authentication secret (such as a password or a token unlocked by mobile biometrics) without ever sharing it with anyone. By removing the need for users to trust enterprises or any 3rd party to secure their credentials, this “trustless” authentication protocol allows us to break down the siloed identity model.</p><p>NuLogin takes advantage of distributed ledger technology (DLT) to anchor the public zero-knowledge proofs derived from authentication secrets. DLT takes the place of centralized silos and eliminates the need for a central authority to store and manage users’ authentication data. This decentralized identity model opens up a whole world of user-centric processes and services such as efficient, reusable KYC or privacy-preserving e-commerce.</p><p>Our work with <a href="https://digitalasset.com/">Digital Asset</a> will be key to bringing decentralized identity and trustless authentication to the enterprise world.</p><h3>DAML + NuID</h3><p>Digital Asset helps enterprises leverage the power of DLT through a business logic-driven contract language, DAML, that abstracts the persistence layer allowing it to run on platforms such as R3’s Corda, Hyperledger Fabric and Sawtooth, VMware Blockchain and AWS Aurora.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/600/0*-umuqxEls3in_5NF.png" /></figure><p>As we began to model our processes with DAML, one of the biggest benefits we realized was that we could focus on writing our workflows without having to figure out the specifics of <em>how</em> the business logic of the use case interacts mechanically with the underlying distributed ledger. By avoiding the tinkering with persistence layer specifics, we are able to actualize a much cleaner architecture that pushes the DLT interaction to the DAML run-time.</p><p>We look at DAML as the perfect tool for expressing our extensible zero knowledge model generically. DAML is like <a href="https://llvm.org/">LLVM</a> for smart contracts-a target-independent intermediate representation-and equally powerful in nature. We will be able to write and maintain NuID’s authentication data model once, in DAML, and target environments across the use-case spectrum.</p><p>To drive adoption of our service, one of our key goals is to make as few changes as possible to the enterprise and user experience. For example, in a typical single sign-on (SSO) workflow, a user registering through one service of an enterprise can leverage the same authentication for other services configured for SSO. DAML inherently allows us to define the parties that can view and access information on the ledger to achieve the cross-domain functionality of SSO. An authentication architecture like this allows us to achieve the same functionality of single sign-on between multiple DAML parties without the traditional prerequisites of coordination and trust between them.</p><p>Additional requirements for the NuLogin service to be enterprise-ready are auditability and traceability. We found that DAML provides this capability at both the logical (language) and physical (immutable DLT) layers to our clients. By specifying parties who can be signatories, participants, or observers on DAML contracts, our clients can easily meet their audit requirements without having to engage in expensive and time-consuming customizations for storage and reporting.</p><p>Finally, technology change management is a significant factor that influences and often slows down enterprise adoption of new technology. Adopting DAML enables NuLogin to be very flexible when it comes to aligning with the existing technology infrastructures of our clients. The <a href="https://hub.digitalasset.com/hubfs/Press%20Releases/Press%20Release%20-%20DAML%20on%20VMware%20PR.pdf">new DAML deployment options</a> coming up with VMware, Hyperledger Sawtooth, R3 Corda, Hyperledger Fabric, and even Amazon Aurora, will allow our service to fully respect and integrate with our client’s underlying technology choices.</p><p>These enterprise-focused design decisions made DAML an ideal tool for NuID to extend its reach into industries such as financial services, healthcare, manufacturing, and retail.</p><h3>Forging ahead</h3><p>As part of this integration, NuID will release open source Clojure bindings to DAML libraries that will make producing DAML-enabled Clojure applications more convenient. This will allow for seamless interoperability between NuID’s service, DAML’s platform, and user-facing applications.</p><p>The synergies between Digital Asset and NuID are best summed up in DA’s first intro series <a href="https://blog.daml.com/daml-driven/distributed-ledgers-need-more-than-traditional-application-design-patterns">blog post</a>: “Digital Asset’s vision is for value transfer to be simple, efficient and secure, driven by a new distributed ledger paradigm that unleashes web-pace innovation unrestrained by data silos.”</p><p>NuLogin’s integration with DAML will extend that silo-wrecking mission to digital identity.</p><p><em>Originally published at </em><a href="https://blog.nuid.io/nuid-daml/"><em>https://blog.nuid.io</em></a><em> on July 2, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e0ad266102fe" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>