Follow

A Taxonomy of Access Control

I can’t believe that no one has described this taxonomy of access control before.

The paper is about cryptocurrency wallet design, but the ideas are more general. Ittay points out that a key—or an account, or anything similar—can be in one of four states:

1. safe Only the user has access,
2. loss No one has access,
3. leak Both the user and the adversary have access, or
4. theft Only the adversary has access.

eprint.iacr.org/2021/1522.pdf

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.