Notifications
Clear all

eTrust not cTrust

6 Posts
2 Users
0 Likes
331 Views
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

Its not the question of if or not. Its a question of HOW to build eTrust (compared to trust by clearance cTrust)?

Hacked closed user groups are not possilbe in the mind of LEOs. But there are. And a hacked closed user group is the same like discussing on FF. See the point?

Am I the only here to the approach of WorstCase (AllHacked)?

HOW to build eTrust in an unsecure environment?

 
Posted : 02/04/2018 7:21 pm
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

What elements are trust-building in an eTrust (electronic Trust) process?

 
Posted : 08/04/2018 9:04 pm
pr3cur50r
(@pr3cur50r)
Posts: 28
Eminent Member
 

To get the ball rolling…

Submit a resume and have at least two trusted referees?

 
Posted : 08/04/2018 10:23 pm
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

eTrust referees? Ouroboros.

 
Posted : 08/04/2018 10:34 pm
pr3cur50r
(@pr3cur50r)
Posts: 28
Eminent Member
 

My understanding is that the eTrust you are referring to is that on forums like this one. So my idea of developing eTrust in this instance would be to have a thoroughly vetted process by which the forum owner requires at least one form of community-based identification like a business email address, LE enforcement email address etc.

For LE I think a response to an email from an LE address would be sufficient, for those coming from outside of LE then perhaps a real-world reference coming from an employer via email may be sufficient.

I guess your question may also relate to those who are looking to develop an understanding for University/College subjects, this is a lot harder to qualify but i'd be happy to hear your thinking.

Perhaps you are looking for input on eTrust in more broad terms?

 
Posted : 08/04/2018 10:55 pm
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

All good aspects but from my point of view weak to really build trust. This as email SPF Sender Policy Frameworks can be spoofed and related to Snowden sending sensitive data over the web does not protect you from the data integrity problem.

eTrust without any vetted process. This may blow your mind, but as hacked-vetted is like none just think of none.

Criminals in DarkNet have own Rules Of Game ROG to find out if LEO wants to come into the game. By invitation only they solve the problem on the surface but also fear to become detected. So they proxy-proxy-proxy-proxy to hide - but

and this is a BIG BUT

they collaborate based on eTrust. Its a matter of fact that criminals faster collaborate than LEO.

Law Enforcement will lose the war if the level of collaboration will not speed up GLOBALLY.

eTrust with no vetting process is the future.

 
Posted : 08/04/2018 11:34 pm
Share: