Feb 8 路 1 min read 路 This article explores the transformation of state sovereignty, which in the digital age is evolving from a territorial form to a procedural one. Using the example of the paralysis of physical infrastructure during disasters, the author demonstrates t...
Join discussionFeb 8 路 1 min read 路 This article provides a thorough analysis of the evolution of statehood in the face of the dominance of digital infrastructure. The author argues that contemporary power depends on the ability to control digital order and the transparency of content ...
Join discussionSep 3, 2024 路 4 min read 路 To implement Self-Sovereign Identity (SSI) in a DevSecOps pipeline, you'll need to follow several steps involving setup, integration, and testing. Below is a detailed technical guide along with a blue
Aalejandro commented
Sep 1, 2024 路 5 min read 路 Introduction In today's digital landscape, the need for secure and privacy-preserving user authentication has never been more critical. Traditional identity management systems, often centralized, expo
Join discussion
Nov 24, 2023 路 1 min read 路 When it comes to e-mail, the rule is simple: don't use the same e-mail for all websites. It is a common practice, but sometimes it can become too convenient. Sharing one e-mail address with multiple sites can make it easy for hackers to get hands-on ...
Join discussion