Summary

  • A new breed of cyber security is emerging that makes the user an integral part of the process, making it much harder for systems to be hacked
  • Called “user as a key” architecture, zero knowledge cryptography methods make it possible for a user to complete a process or function within a system, and then leave, taking their digital footprint with them
  • This makes it near impossible for hackers to gain access to multiple parts of a system, as each user only holds the information needed to access their own data, and no one else’s
  • This model also stops administrators from being able to access customers’ data, providing an additional level of security and peace of mind

By Tide Foundation

Original Article