Guido loves tinkering with toys. At a young age he took things apart to see how they worked. Later he also learned how to put them back together in working order. These days he applies that curiosity to internet security. He took apart the PKI-security tools and put them back in a different order to discover very interesting properties: security can be easy.
Eccentric Authentication
Eccentric Authentication is an authentication protocol. It uses cryptographic certificates to identify clients. However, the certificates do not contain any personal identifiable information. So how can it be trusted? With the aid of a verification service, these conflicting properties can be merged to provide strong digital pseudonyms that protect the users' privacy.