Content pfp
Content
@
0 reply
0 recast
0 reaction

ian c rogers pfp
ian c rogers
@iancr
There's a new protocol from @ledgerofficial that gives you more control over your data. Read the White Paper below. Last week @Ledger announced Ledger Key Ring Protocol, which allows users to use Ledger devices for encrypted key management. 🧵 🪡👇
1 reply
2 recasts
9 reactions

ian c rogers pfp
ian c rogers
@iancr
This has many potential uses, but for me the most exciting is a new way of looking at the user’s ownership and control over their data. https://www.ledger.com/blog-ledger-key-ring-protocol-secure-data-sharing You can read the White Paper here, and comments are welcome: https://github.com/LedgerHQ/ledger-key-ring-protocol-whitepaper/blob/a7ecef7376c3d2d87e8a44cf536d3c1e1a4c1bdc/Ledger%20Key%20Ring%20Protocol%20Technical%20White%20Paper.pdf
1 reply
0 recast
2 reactions

ian c rogers pfp
ian c rogers
@iancr
Why Ledger Key Ring Protocol? I started “living on the Internet” in college circa 1990. The way you gained access to a server was with your username and login. When the World Wide Web emerged in the early to mid-90s, Websites wanted to save your information, preferences, and application state so they asked you for a username and password too.
1 reply
0 recast
1 reaction

ian c rogers pfp
ian c rogers
@iancr
Eventually your email address became your username and most Websites started to save all your activity using your email address as the identifier. “Web 2.0” emerged in the 2000s, and login started consolidating behind your Facebook, Google, or Apple accounts.
1 reply
0 recast
1 reaction

ian c rogers pfp
ian c rogers
@iancr
The question now is, “who owns you?” If you really want to feel the degree to which you are owned by one of these companies, try moving from an iPhone to Android or vice versa. The “lock in” is painful and intentional.
1 reply
0 recast
1 reaction

ian c rogers pfp
ian c rogers
@iancr
We willingly hand over data about our behavior and preferences on and offline to companies (Apple, Google, ByteDance, Uber, and every company in partnership with that airport wi-fi you just logged into) who use that data to bring us all kinds of conveniences (funnier videos, driving directions, restaurant recommendations, “targeted” advertisements).The downsides of this have been well documented in films such as The Great Hack and books such as Surveillance Capitalism.
1 reply
0 recast
1 reaction

ian c rogers pfp
ian c rogers
@iancr
Collectively, we’ve gone from unaware to “aware and trying not to think about it.” I’ve always dreamed of a world where I own my data and I can decide who gets exactly which data with my explicit permission.
2 replies
1 recast
1 reaction

ian c rogers pfp
ian c rogers
@iancr
For a few years now I have been saying: - Web 1.0 was username/password - Web 2.0 was login with Facebook, Google, or Apple - Web 3.0 will be secure login with your private key Ledger Key Ring Protocol is a powerful tool in this turning toward user privacy and control over their own data.
1 reply
0 recast
1 reaction