Posted by sovereign in Privacy (edited )

Providing advanced cybersecurity for physical and digital resources using a message passing protocol over the I2P network, authentication to resources using elliptic curve digital signatures (Monero tech), and optionally leveraging the power consumption (70 megawatt hours) of all Monero miners globally for authorization to secure systems at essentially no cost.

Easy-to-use with an automated personal digital assistant (authbot) for key management and digital signature services.

The Sovereign PAM Resource secures ssh access and sudo privilege escalation on Linux computers with elliptic curve digital signatures and optionally, Monero proof-of-payment.

To learn more, visit: http://sovereign.i2p

1

Comments

You must log in or register to comment.

There's nothing here…