Zooko

Zooko

Zooko is a peer-to-peer hacker and cypherpunk known for his work on Digicash, Mojo Nation, mnet, and AllMyData. He is the designer of multiple network protocols that incorporate such concepts as self-contained economies and secure reputation systems. He is the co-designer, along with Phil Zimmermann, of ZRTP. Zooko is credited as the originator of Zooko's triangle, a schema that relates three desirable properties of identifiers.

He is currently working on the Tahoe Least-Authority Filesystem.

External links

* [http://zooko.com/ Website]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Zooko's triangle — is a diagram named after Zooko Wilcox O Hearn which sets out the possible alternatives for a system for giving names to participants in a network protocol. At the vertices of the triangle are three properties that are generally considered… …   Wikipedia

  • Zookos Dreieck — (engl. Zooko s triangle) ist eine Theorie von Zooko Wilcox O Hearn, nach der ein Namensraum in einem Rechnernetz nur zwei der drei Eigenschaften dezentralisiert, sicher und aussagekräftig gleichzeitig erfüllen kann.[1] In einem Namensraum werden… …   Deutsch Wikipedia

  • Open source license — An open source license is a copyright license for computer software that makes the source code available under terms that allow for modification and redistribution without having to pay the original author. Such licenses may have additional… …   Wikipedia

  • Interlock protocol — The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an …   Wikipedia

  • Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… …   Wikipedia

  • Confused deputy problem — A confused deputy is a computer program that is innocently fooled by some other party into misusing its authority. It is a specific type of privilege escalation. In information security, the confused deputy problem is often cited as an example of …   Wikipedia

  • List of revision control software — This is a list of notable software for revision control. Distributed model In the distributed approach, each developer works directly with their own local repository, and changes are shared between repositories as a separate step. Open source *… …   Wikipedia

  • Coyotos — is a capability based security focused microkernel operating system developed by The EROS Group, LLC.[1] It is a successor to the EROS system that was created at the University of Pennsylvania and Johns Hopkins University. History Coyotos is… …   Wikipedia

  • Petname — Infobox Software name = Petname caption = Petname developer = Tyler Close latest release version = 0.18 latest release date = Nov 4, 2006 operating system = Cross platform genre = Mozilla extension license = ? website =… …   Wikipedia

  • Object-capability model — The object capability model is a computer security model based on the Actor model of computation. The name object capability model is due to the idea that the capability to perform an operation can be obtained by the following combination: an… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”