Главная
Study mode:
on
1
Introduction
2
Proxying vs Delegation
3
Durable Power of Attorney
4
Root vs Pseudo
5
Our Back
6
Old fashioned entitlements
7
The problem we got into
8
Working for more than one organization or department
9
Context Governance
10
Identity
11
Functions
12
Game of Clue
13
Federation
14
Non enterprise roles
15
Incapacitation
16
Example
17
Delegation Authority
18
Authentication
19
Passwords
20
My Dad
21
The elegance of programming
22
My dad didnt believe in security
23
How do you do this
24
Arguments for using their accounts
25
Arguments against using their accounts
26
Google turned me into my mother
27
I had for Gmail accounts
28
I added my other personal email as an alternate
29
And my mothers
30
Thats scary
31
If youre Superman
32
Googles response
33
Other problems
34
CFAA
35
Shortterm recommendations
36
Industrywide standardization
37
Digital concierge service
38
Conclusion
39
Questions Comments
Description:
Explore a thought-provoking conference talk that delves into the complexities of security proxying and delegation in the digital age. Examine the parallels between durable power of attorney and digital access, and how modern technology has blurred the lines between personal and professional identities. Investigate the challenges of working across multiple organizations, context governance, and the intricacies of federation. Learn from real-life examples, including the speaker's personal experiences with Google accounts and family dynamics. Discuss the arguments for and against using others' accounts, the potential legal implications, and the need for industry-wide standardization. Conclude with short-term recommendations and the concept of a digital concierge service to address these evolving security challenges.

How Google Turned Me into My Mother - The Proxy Paradox in Security

Add to list
0:00 / 0:00