Zero Trust: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
(Improve linking.)
(Mend link.)
Line 10: Line 10:


== See also ==
== See also ==
* [[Authentic Data Chain Containers]  (ADCs)
* [[Authentic Data Chain Containers]]  (ADCs)
* [[Behavioural analytics]]
* [[Behavioural analytics]]
* [[Biometric recognition]]
* [[Biometric recognition]]

Revision as of 09:55, 14 August 2025

Digital identity - security.

A high level of digital identity security.


"Zero trust, unlike Zero Knowledge Proof, does not accept any device or access without verification. In other words you might reveal where Wally is in your identity profile, but I still don’t trust that it’s you without a verification. In addition, I don’t trust your device, system, platform, profile or any other aspect of who you are until you verify. This approach to security means that you cannot access anything until your identity and device that you are using is fully authenticated, identified and been verified. It is pretty much the approach used by many today."

Chris Skinner's Blog - 21 July 2025.


See also


Other resource