Jeff Lombardo (@identitymonk) 's Twitter Profile
Jeff Lombardo

@identitymonk

Dubito ergo cogito. Not a GURU, just a monk trying to comprehend, discuss & promote best practices, evolutions and trends of Digital Identity, Privacy and Trust

ID: 384330643

linkhttps://x-iam.com calendar_today03-10-2011 14:02:39

9,9K Tweet

1,1K Followers

608 Following

Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

repeat after me Node.js Certificate Key Usage are different from Extended Key Usage. So why are you returning the latter with a method named after the former? Why can't we still not access Certificate extensions through the Crypto API?

Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

Some can be highly confident answers, asserted with highest assurance. Tested LLMs on a iFixIt article for laptop fan cleaning. Q: how many screws to unscrew to remove the cover? A: you need to remove 5. Still article has no mention of it, only picture with 7 circled screws

Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

He brought us together, elevated our field but not only, he sow many seeds... He will remain in what we grow beyond. Farewell Vittorio you will be missed

Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

multiple organizations around #standards and #identity just launched an award in the name of Vittorio Luigi Bertocci Vittorio digitalidadvancement.org/vittorio Subscribe and contribute as a way to promote the legacy and values he cherished

multiple organizations around #standards and #identity just launched an award in the name of Vittorio Luigi Bertocci <a href="/vibronet/">Vittorio</a> digitalidadvancement.org/vittorio Subscribe and contribute as a way to promote the legacy and values he cherished
Werner Vogels (@werner) 's Twitter Profile Photo

I like to personally apologise to Raphael Manke and Luc van Donkersgoed for our actions yesterday. Both Raphael and Luc are tremendous assets to the AWS community and their Re:Invent Schedulers are serving a need for our customers. Raphael's is back, but sorry that Luc won't continue.

Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

2003: heard them as soon I get out of the plane 2013: got the chance to see them in concert at the Pauline-Julien stage, we were 50... Jerome was serving beers from scene 2023: 😭 Karl left to sing with angels thank you for the journey @LesCFringants

2003: heard them as soon I get out of the plane
2013: got the chance to see them in concert at the Pauline-Julien stage, we were 50... Jerome was serving beers from scene
2023: 😭 Karl left to sing with angels
thank you for the journey @LesCFringants
Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

why hackers wear hoodies while "working"? Cause by putting the hood on they can shield themselves from external noise and disturbance 🤷

Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

3 types of isolation 1. one workload fron the other 2. workload to host 3. but harder is host to workload 3. cannot be done without diving in silicon / chip level protection. #Attestation is core and need to be verifiable by 3rd party #Confidential #Conputing #Identiverse #TEE

3 types of isolation
1. one workload fron the other
2. workload to host
3. but harder is host to workload

3. cannot be done without diving in silicon / chip level protection. #Attestation is core and need to be verifiable by 3rd party

#Confidential #Conputing #Identiverse #TEE
Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

future of #computing will be #confidential #computing by default which will include high entropy high assurance random number generators. #Attestation can allow to verify quality at all levels #Identiverse

future of #computing will be #confidential #computing by default which will include high entropy high assurance random number generators.
#Attestation can allow to verify quality at  all levels 
#Identiverse
Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

US Navy did wake up & said we need #confidential #computing. They started with a use case based on their data. They want to anonymize the #compute and create some #CleanRoom. That is why confidential computing is nore than just CPU, it is GPU too. #Confidential #AI #Identiverse

Jeff Lombardo (@identitymonk) 's Twitter Profile Photo

very good animation by Steve Wilson - so you say that with #Confidential #computing can be done without regard to the location, but what about #privacy r - with CC you attest environment not location - but it is not cause you can that you should #identiverse