Petname

From HandWiki

Petname systems are naming systems that claim to possess all three naming properties of Zooko's triangle - global, secure, and memorable.[1] Software that uses such a system can satisfy all three requirements. Such systems can be used to enhance security, such as preventing phishing attacks.[2] Unlike traditional identity systems, which focus on the service provider, Petname systems are decentralized and designed to facilitate the needs of the enduser as they interact with multiple services.[3][4]

History

Though the Petname model was formally described in 2005 by Mark Stiegler, the potential of the system was discovered by several people successively.[3]

Examples

  • The GNU Name System (GNS) – a decentralized alternative to DNS based on the principle of a petname system[5]
  • CapDesk – a distributed desktop environment[6]
  • Petname Tool (discontinued browser extension) – There was a browser extension available for Firefox called Petname Tool that allowed pet names to be assigned to secure websites. Use of this extension could help prevent phishing attacks.[7]

PetName Markup Language

The PetName Markup Language (PNML) is a proposal for embedding Petname information into other systems using a custom markup language.[4]

PNML consists of two tags:

  • <pn>pet-name-string</pn>
  • <key>stringified-cryptographic-key</key>

References

  1. "An Introduction to Petname Systems". http://www.skyhunter.com/marcs/petnames/IntroPetNames.html. 
  2. Sadek Ferdous; Audun Jøsang; Kuldeep Singh; Ravishankar Borgaonkar (2009). Security Usability of Petname Systems. Lecture Notes in Computer Science. Springer Science+Business Media. ISBN 9783642047657. https://books.google.com/books?id=mSMsqoqufMoC&pg=PP1. 
  3. 3.0 3.1 Audun Jøsang; Torleiv Maseng; Svein J. Knapskog (29 September 2009). Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings. Springer Science & Business Media. pp. 1–. ISBN 978-3-642-04765-7. https://books.google.com/books?id=mSMsqoqufMoC&pg=PP1. 
  4. 4.0 4.1 "The PetName Markup Language". http://www.erights.org/elib/capability/pnml.html. 
  5. Schanzenbach, Martin; Grothoff, Christian; B., Fix (2022-02-03). "The GNU Name System". IETF. https://lsd.gnunet.org/lsd0001/#section-1-4. "The design of GNS incorporates the capability to integrate and coexist with DNS. GNS is based on the principle of a petname system and builds on ideas from the Simple Distributed Security Infrastructure [SDSI]." 
  6. "E and CapDesk". http://www.combex.com/tech/edesk.html. 
  7. Markus Jakobsson; Steven Myers (2006). Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience. ISBN 0471782459. https://archive.org/details/phishin_xxx_2007_00_6680. 

External links