The Making of Digital Identity - 03
syntheticauth.ai·6d·
Discuss: r/programming
🌐ARPANET History
Preview
Report Post

Part 1 of this series left off with the question of whether we can verify identity without storing the proof in recoverable form.

Part 2 of this series left us with authentication working—passwords hashed, systems hardened, privileges separated. Users could log in from different terminals. Trust was local and centralized: one system, one administrator, one password file.

Then we connected the systems together.

Part 3 is the story of how we spent the 1980s and 90s trying to recreate centuries of social technology in mathematics, and discovered that bits aren…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help