mirror of
https://github.com/tlsnotary/website.git
synced 2026-01-08 21:48:05 -05:00
Improved diagrams (dark/light mode support)
This commit is contained in:
@@ -12,7 +12,8 @@ Data provenance will make data truly portable, empowering users to share it with
|
||||
|
||||
## Non-repudiation: TLS is not enough
|
||||
|
||||

|
||||

|
||||

|
||||
|
||||
Transport Layer Security (TLS) plays a crucial role in digital security. TLS protects communication against eavesdropping and tampering. It ensures that the data received by a user (_"Alice"_) indeed originated from the `Server` and was not changed. The `Server`'s identity is verified by Alice through trusted Certificate Authorities (CAs). Data integrity is maintained by transmitting a cryptographic hash (called Message Authentication Code or MAC in TLS) alongside the data, which safeguards against deliberate alterations.
|
||||
|
||||
@@ -24,7 +25,8 @@ While the concept seems straightforward, enabling servers to sign data is not a
|
||||
|
||||
## Status Quo: delegate access
|
||||
|
||||

|
||||

|
||||

|
||||
|
||||
Currently, when Alice wants to share data from a `Server` with another party, OAuth can be used to facilitate this if the application supports it. In this way, the other party receives the data directly from the `Server`, ensuring authentic and unchanged data. However, applications often do not provide fine-grained control over which data to share, leading to the other party gaining access to more information than strictly necessary.
|
||||
|
||||
@@ -34,7 +36,8 @@ It's worth noting that in many instances, OAuth is not even presented as an opti
|
||||
|
||||
## TLSNotary: data provenance and privacy with secure multi-party computation
|
||||
|
||||

|
||||

|
||||

|
||||
|
||||
TLSNotary operates by executing the TLS communication using **multi-party computation** (MPC). MPC allows Alice and Bob to jointly manage the TLS connection.
|
||||
With TLSNotary, Alice can selectively prove the authenticity of arbitrary portions of the data to Bob. Since Bob participated in the MPC-TLS communication, he is guaranteed that the data is authentic.
|
||||
|
||||
Reference in New Issue
Block a user