en

Head to Bengaluru’s Ishtaa to relish tried and tested comfort food




en

Celebrated Chennai cook, Mountbatten Mani Iyer, no more

The legendary wedding caterer Mountbatten Mani Iyer who was known for cooking memorable traditional wedding feasts passed away peacefully on September 22 in Chennai




en

Circars Bistro: A new hub for American and continental cuisine in Visakhapatnam

Circars Bistro, Visakhapatnam’s newest American and continental dining space, offers a smorgasbord of offerings for the palate




en

Teen infected in Canada’s first bird flu case is in critical condition - The Washington Post

  1. Teen infected in Canada’s first bird flu case is in critical condition  The Washington Post
  2. A Canadian teen is in critical condition with what is believed to be bird flu  The Associated Press
  3. Teenager in critical condition with Canada’s first human case of bird flu  The Guardian
  4. H5N1-infected teenager now in ‘critical condition’ say Canadian doctors  The Telegraph
  5. Canadian teen with suspected avian flu in critical condition  University of Minnesota Twin Cities




en

Video: Mike Tyson shows he's not your typical 58-year-old during open workout - MMA Junkie

  1. Video: Mike Tyson shows he's not your typical 58-year-old during open workout  MMA Junkie
  2. Tyson vows to bring 'devil himself' into Paul fight  ESPN
  3. Watch 58-Year-Old Mike Tyson Crush Pads Days Away from Jake Paul Fight  Sports Illustrated
  4. Mike Tyson-Jake Paul: How to watch the fight, time, odds  The Associated Press
  5. The Mike Tyson-Jake Paul boxing match shows streaming is just cable now  The Washington Post






en

Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing - Video Games Chronicle

  1. Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing  Video Games Chronicle
  2. Lego Horizon Adventures Review  IGN
  3. Lego Horizon Adventures: How Long to Beat (& Chapter List)  GameRant
  4. Lego Horizon Adventures is a delightful, kid-friendly twist on Horizon Zero Dawn  Polygon
  5. How LEGO Horizon Adventures was built with real LEGO bricks, out Nov 14  PlayStation







en

Israel's West Bank settlers hope Trump's return will pave the way for major settlement expansion - ABC News

  1. Israel's West Bank settlers hope Trump's return will pave the way for major settlement expansion  ABC News
  2. Ex-Trump aides warn Israeli ministers not to assume he’ll back annexation in 2nd term  The Times of Israel
  3. This Is How Netanyahu Will Annex the West Bank  Haaretz
  4. Eyeing Trump support, Israeli minister pushes for West Bank settlement annexation  CNN





en

Who is Mike Huckabee, the evangelical, pro-settlement envoy to Israel? - Al Jazeera English

  1. Who is Mike Huckabee, the evangelical, pro-settlement envoy to Israel?  Al Jazeera English
  2. Mike Huckabee once said that ‘there’s really no such thing as a Palestinian’  CNN
  3. Trump nominates Mike Huckabee for US ambassador to Israel  Fox News
  4. Trump Picks Mike Huckabee, Former Arkansas Governor, for Ambassador to Israel  The New York Times




en

US defense contractor to pay former Iraqi detainees $42 million for its role in torture at notorious Abu Ghraib prison - CNN

  1. US defense contractor to pay former Iraqi detainees $42 million for its role in torture at notorious Abu Ghraib prison  CNN
  2. Abu Ghraib torture survivors win US civil case, $42m damages  Al Jazeera English
  3. US jury awards $42m to ex-detainees at Iraq's Abu Ghraib  BBC.com
  4. How a Troy lawyer convinced U.S. jury to award $42 million to 3 Iraqi prisoners  Detroit Free Press
  5. U.S. Jury Awards $42 Million to Iraqi Men Abused at Abu Ghraib  The New York Times








en

How to Ask Someone if They Like You As a Friend

If you really like spending time and hanging out with someone, you’re probably wondering if they feel the same way. While it’s sometimes pretty easy to tell if somebody is your friend, it never hurts to ask, especially if you want to pursue a more serious relationship with them. We know that it’s a little nerve-wracking to have this conversation, but there are a lot of ways to talk about it without any stress. Keep reading for a list of different direct and indirect ways you can pose the question.




en

Bengaluru is the top option for Indian non-residents looking to buy mid-range and affordable homes

Data gathered from several consulting firms by HT Digital indicated that Bengaluru has maintained its position as the top option for non-resident Indians wishing to invest in India’s residential real estate market, particularly those seeking affordable and mid-segment homes.  The … Continue reading



  • Real Estate News
  • Affordable Housing
  • Bengaluru real estate
  • Bengaluru's real estate market
  • Indian real estate
  • Indian Real Estate market

en

By 2030, Bengaluru will possess 330-340 million square feet of office space in India: report

The primary demand generators for Bengaluru’s office market are anticipated to be the technology, engineering, manufacturing, and BFSI sectors.  The Confederation of Indian Industry and CBRE report projects that Bengaluru, the country’s IT hub, will maintain its dominant position in … Continue reading



  • Real Estate News
  • Bengaluru's real estate
  • Bengaluru's real estate market
  • India's real estate
  • Indian real estate

en

Tenant news to rejoice about! The April-June quarter saw an average price correction of 5-10% in Bengaluru’s rental housing market

Bengaluru’s rental housing market saw an average price correction of 5-10% during the April-June quarter of the current calendar year, according to local brokers who spoke with HT.com. This news should cheer up tenants in the city. The primary reasons … Continue reading



  • Real Estate News
  • Bengaluru's real estate
  • Bengaluru's real estate market
  • Bnegaluru's rental market
  • Indian real estate
  • Indian Real Estate market

en

Delhi’s Top 5 Rental Income Spots in Dwarka

In Delhi, Dwarka is a possibility for investors who want to earn a lot of money from their investments but can’t find the perfect neighborhood. Its abundance of residential options attracts tenants and end users, and it is supported by … Continue reading



  • Real Estate News
  • Delhi's real estate
  • Dwarka real estate
  • Dwarka real estate's market
  • Indian real estate

en

The elimination of indexation benefits in real estate will discourage secondary market sellers

The real estate industry warned that eliminating indexation benefits for long-term capital gains would stunt its expansion, negatively affecting property owners and potentially increasing taxes. While experts thought low returns could still be a problem, authorities disagreed, citing high real … Continue reading



  • Real Estate News
  • 2020 budget's impact on real estate
  • 2024 Budget
  • Indexation
  • Indian real estate
  • Indian Real Estate market
  • LTCG

en

What occurs in India if property taxes are not paid for ten years?

Property owners may face serious legal and financial ramifications if they fail to pay their property taxes. Therefore, timely paying such taxes is necessary to continue taking advantage of the municipal amenities. Owners must take immediate action if a property … Continue reading



  • Real Estate News
  • Indian property laws
  • Indian real estate
  • Indian tax laws
  • penalties in Unpaid taxes
  • Property tax in India

en

The top three places in North Goa to rent for a lot of money

North Goa may be the best option if you want to invest in real estate in Goa and make significant profits. The area is an investment-friendly destination because it attracts large numbers of tourists year-round and because properties such as … Continue reading



  • Real Estate News
  • Famous places in Goa
  • Goa's real estate
  • Goa's real estate market
  • India's real estate market

en

DLF is set to debut high-end villas in Goa, priced between Rs 40 and Rs 50 crore

Approximately 32 kilometers from the Goa International Airport in Dabolim, the opulent project will have 62 villas atop Reis Mago, a hill in Goa.  In the second half of the 2024-2025 fiscal year, 62 ultra-luxury villas in Goa, priced between … Continue reading



  • Real Estate News
  • DLF in Goa
  • Goa
  • Goa's real estate
  • Goa's real estate market

en

The Civil Code of Procedure (CPC) defines Attachment of Property

Before purchasing, buyers should confirm that a property is free from legal issues. They must comprehend ideas from the Code of Civil Procedure (CPC), such as “Attachment of Property,” to do this. Attachment is the legal term for taking possession … Continue reading



  • Real Estate News
  • Attachment of Property
  • Civil code of Procedure
  • cpc
  • Indian laws
  • Indian real estate regulation

en

How India’s Tier 2 cities are growing in response to global real estate trends

Property in India’s Tier 2 cities has a bright future, presenting residents and investors with unmatched opportunities.  The global real estate market is changing dramatically, and new trends are changing the way cities expand and change. Greater infrastructure, faster urbanization, … Continue reading



  • Real Estate News
  • Indian real estate
  • Indian Real Estate market
  • Tier-2 cities in India

en

Godrej Properties moves into Indore and purchases a 46-acre plot for planned development

Godrej Properties Ltd has announced the acquisition of a roughly 46-acre land parcel in Indore. According to the company’s July 31 regulatory filing, the development on this land will mostly consist of plotted residential units and offer an estimated saleable … Continue reading



  • Real Estate News
  • Godrej Proeprties
  • Indian real estate
  • Indian Real Estate market
  • Indore
  • Indore real estate
  • Indore real estate market

en

Five Factors That No Homebuyer Should Ignore When Selecting a Luxurious Property

Are you trying to find a cozy haven with a view of the city skyline? The desire for luxurious living is growing, and renowned builders like Nitara Projects are fostering this desire by offering strong, innovative, and tastefully designed premium … Continue reading



  • Real Estate News
  • Indian real estate
  • Indian Real Estate market
  • luxurious properties
  • Luxurious properties in India

en

Learn about the Delhi-Alwar RRTS route map, stations, important information, and most recent updates in 2024

The Delhi-Alwar Regional Rapid Transit System (RRTS) is currently under construction and will link Delhi with the outlying satellite towns of Manesar, Rewari, and Alwwar. It will also link Delhi Metro’s four lines. Ten kilometers of the route are currently … Continue reading



  • Real Estate News
  • Alwar
  • Alwar real estate market
  • Alwar's real estate
  • Delhi
  • Delhi Metro
  • Delhi-Alwar metro
  • Delhi's real estate
  • Delhi's real estate market

en

Delhi Development Authority’s New Approach to Property Documentation

However, the Delhi Development Authority (DDA) is making a groundbreaking shift in how it handles property documentation. Starting in September 2024, buyers will receive their flat documents in a sophisticated, customized folder. This change comes after concerns raised by Lieutenant … Continue reading



  • Real Estate News
  • DA housing schemes or property buying tips
  • DDA Housing Schemes
  • DDA Housing Schemes 2024
  • Delhi Development Authority
  • Housing Documents in India
  • Property Possession Process

en

The Growing Potential of SM REITs in India

By 2026, the SM REIT market could be worth over $60 billion. Over 350 million square feet of commercial office space are ready for investment. Among the top cities, Mumbai leads with 75 million square feet of SM REIT-ready office … Continue reading



  • Real Estate News
  • Leading Cities in India
  • SM REITs in India
  • Small and Medium REITs
  • What Are SM REITs?

en

12 Hidden iPhone Features You’ll Wish You Started Using Sooner

Try these 12 incredible iPhone tips and tricks for 2024 that will change the way you use your iPhone! From a hidden sleep timer in the Clock app to bypassing annoying ads in Safari WITHOUT an ad blocker, these hacks will save you time and headaches!




en

Get the Nikon Z50 Two Lens Kit for $1,149 (originally $1,349) – $200 savings

The Nikon Z50 Two Lens Kit features a 20.9MP DX-format sensor, 4K video capabilities, and two versatile zoom lenses. This mirrorless camera kit provides a complete solution for both photography and videography. Reasons to Buy What Makes It Stand Out The Z50 combines Nikon’s mirrorless technology with a practical two-lens solution. The included VR (Vibration Reduction) lenses […]




en

16 Forbidden Doors Hiding Dark Secrets

Doors are usually mundane, but these 16 different doors all hide terrible secrets behind them. Or do they?




en

Potential Tropical Storm Sara’s development and impact




en

Timed ticketed entry for Glacier National Park next summer brings mixed reactions




en

Flathead Warming Center supporters take to the streets to show solidarity with homeless population




en

Excellence.Gov “Top 5” Award Winners

"The Industry Advisory Council’s (IAC) eGov Shared Interest Group (SIG) and the Federal CIO Council, in partnership with E-Gov, today announced the Federal agency programs selected as the “Top 5” within the Excellence.gov awards program. These prestigious programs were selected...




en

Felony offender registries

Someone came to the site looking for a Felony Offender registry. As far as I can tell the only state that has an online registry of felony offender is Tennessee. Here are two lists of links to official Megan's Law...




en

Department of Interior websites shut down for security reasons

A federal judge in Washington yesterday ordered the Interior Department to shut down most of its employees' Internet access and some of its public Web sites after concluding that the agency has failed to fix computer security problems that threaten...




en

eVote Tampering - So easy even a monkey could do it!

Critics of the Diebold touch-screen voting machines turned their attention Wednesday from the machines themselves to the computers that will tally the final vote, saying the outcome is so easy to manipulate that even a monkey could do it. And...




en

China Censors Target Blogging

Reporters Without Borders reports today that Chinese authorities have stepped up Internet censorship to include blogging, closing two sites hosting blogs, Blogbus.com and and Blogcn.com.




en

Relationships are Entangled

Summary: People aren't digitally embodied. As a result, their online relationships are anemic. As we think about the kinds of digital identity systems that will help people live authentic online lives, we must build identity systems that give people tools to operationalize rich digital relationships.

Identity is the ability to recognize, remember, and react to people, organizations, systems, and things. In the current web, companies employ many ponderous technological systems to perform those functions. In these systems, we are like ghosts in the machines. We have "accounts" in companies' systems, but no good way to recognize, remember, and react to them or anyone else. We are not digital embodied.

One of the great benefits of embodiment is the ability to form and operationalize rich digital relationships. I've written a lot about the nature of digital relationships.

One of the discussions at VRM Day caused me to think about a feature of digital relationships I hadn't considered before. Someone said that if you think about a graph with people (or things, organizations, and so on) as the nodes, the relationships are the edges, like so1:

A single, bi-directional relationship (click to enlarge)

In this figure Alice and Bob have a bi-directional relationship. This is how I've normally thought about it and how I'd have drawn it. But in today's discussion, someone said that the relationship is shared and that Alice and Bob both control it. But I realized that viewpoint is too simple. Specifically, Alice and Bob each have a different perspective of that relationship and will use it separately.

For example, imagine that Alice is the cashier at a grocery store and Bob is a customer. Alice gives great service, so Bob seeks her out when he shops. Alice on the other hand has no particular recollection of Bob from encounter to encounter. For Alice, the relationship is ephemeral, but for Bob, it's longer term. The nature of each relationship is different. So, we might look at it like this:

Two uni-directional relationships (click to enlarge)

But after discussing it some more, I realized that these relationships aren't independent. They're entangled like this:

Entangled relationships (click to enlarge)

In the example I gave above, as Bob seeks out Alice more and more, Alice might come to recognize him and call him by name, changing the nature of her relationship with Bob. And that may influence the nature of Bob's relationship with Alice. Over time, these interactions influence both relationships. So, while Alice and Bob both have control over their relationship with the other, actions by one influence the other.

I frequently say that we don't build identity systems to manage identities, but rather to manage relationships. The problem with contemporary identity systems is that they are all one sided, controlled by one party—almost always a company. As I've said before, people are not digitally embodied and thus have no good way to manage their online relationships. As we strive to build better digital identity systems, I think it's paramount that we build systems that provide people with tools that embody them and provide them with the ability to operationalize their online relationships. These are more than decentralized; they are self-sovereign.

Notes

  1. Peer decentralized identifiers (DIDs) are a great technology for creating bi-directional relationships.

Tags:




en

Using X.509 Certs for DID Provenance

Summary: The abundance of X.509 certificate authorities who already perform identity proofing for businesses provides a rich resource that can be leveraged to boot the verifiable data ecosystem.

When you used a verifiable credential to prove something about yourself, the verifier can know cryptographically: (1) the identifiers for the issuer, (2) the credential hasn't been tampered with, (3) the credential was issued to you, and (4) the credential hasn't been revoked. These four checks are important because their establish the fidelity of the data being transferred. They don't, however, tell them whether they can trust the issuer. For that, they need to take the issuer's decentralized identifier (DID) that they got from credential presentation and determine who it belongs to.

At the most recent Internet Identity Workshop, Drummond Reed gave a session on how X.509 certificates could help with this. The first step, like always, is to resolve the DID and retrieve the DIDDoc that associates keys and endpoints with the DID. The endpoint can be an HTTP server and, of course, should have an X.509 certificate providing TLS security. That certificate, at the very least, has a a domain name to bind that to the certificate's public key. It can, if you pay for the feature, also include information about the entity that applied for the certificate. The certificate authority proofs that information and is vouching for it when they sign the certificate.

The key to making the X.509 certificate useful for checking the provenance of a DID lies in one key change. X.509 certificates can contain and extended field called a Subject Alternative Name. This following figure shows how it can help.

Using X.509 Certificates to establish the owner of a DID (click to enlarge)

In this figure:

  1. The issuer (Attestor) creates the DID they will use to issue the certificate along with its associated DIDDoc, including an HTTP endpoint for DID verification.
  2. Attestor applies for a X.509 certificate for that endpoint, including in the application the DID they created in (1).
  3. The certificate authority does it's usual proofing of the application and issues a certificate that includes the DID in the Subject Alternative Name field.
  4. The issuer creates a credential definition in the usual way that includes their DID and writes it to whatever Verifiable Data Registry their DID method dictates.
  5. Attestor issues a credential to a holder (Alice) using that credential definition.
  6. At some later time, Alice presents the credential to the verifier (Certiphi).
  7. Certiphi resolves the DID to get the DIDDoc and retrieves the verfication endpoint from the DIDDoc
  8. Certiphi retrieves the certificate for that endpoint1.
  9. Certiphi verifies the certificate by checking it's signature and ensures that the DID in the DIDDoc for the credential matches the one in certificate.2

The issuer's DID has now been tied in a verifiable way to whatever information is in the certificate. Provided the certificate includes information about the entity beyond the domain name, the verifier can use that information to determine whether or not the credential is authentic (i.e., issued by who the credential definition purports issued it). That might be all the evidence they need to determine whether to trust the entity. Certificate authorities could also issue verifiable credentials to the customer attesting the same verified claims—after all, it's one more product they can offer.

The benefit of doing issuer validation using X.509 certificates is that there are already many trusted X.509 certificate authorities in business who already do proofing of attributes about businesses. That's a huge chunk of the verifiable data ecosystem that doesn't need to be built because it can be leveraged. To make this work, digital certificate authorities would need to start offering to validate DIDs and include them in a certificate as a Subject Alternative Name. I don't discount that this will take some bureaucratic maneuvering. Certificate authorities will need to see a business opportunity. I'd love to see Digitcert or someone do a pilot on this.

Notes

  1. Note that this step might be combined with the previous step if the Verifiable Data Registry is the same server as the endpoint, but that's not necessarily going to be the case for a number of reasons.
  2. Note that this does not create a call back wherein Attestor can determine which credential was used, preserving the privacy of the presentation. Attestor does know one of its credentials has been presented to Certiphi. If this information leakage bothers you, then any web-based DID method is potentially a problem.

Tags:




en

Internet Identity Workshop XXXVIII Report

Summary: This spring's IIW was full of interesting people and interesting discussions with people from around the globe.

We recently completed the 38th edition of the Internet Identity Workshop. We had 330 people from around the world who called 169 sessions. As usual there was lots of energy and thousands of side conversations. IIW is a place to get things done and it showed in the energy and the comments people made to me about how much they enjoyed it.

Tuesday opening (click to enlarge)

As you can see by the pins in the map at the top of this post, there were attendees from all over the world. Not surprisingly, most of the attendees were from the US (241), followed by Canada (11). Germany, India, and Switzerland rounded out the top five with 9, 8, and 7 attendees respectively. Attendees from India (5), Thailand (3), and Korea (3) showed IIW's diversity with attendees from APAC. And there were 4 attendees from South America this time. Sadly, there were no attendees from Africa again. Please remember we offer scholarships for people from underrepresented areas, so if you'd like to come to IIW39, please let us know. If you're working on identity, we want you there.

Demo hour on Wednesday (click to enlarge)

For states and provinces, California was first with 122. Washington (16), Utah (10), Texas (10) and New York (10) rounded out the top five. San Francisco (14) Oakland (13), San Jose (12), Seattle (11), and New York (9) were the top cities.

Drummond Reed conducts a session (click to enlarge)

In addition to sessions, we have a demo hour on Wednesday that is a little like speed dating. There were 20 different projects highlighted. There's always more than one session that I want to attend in any given time slot and choosing is hard. That's a common refrain. Luckily we have sessions notes that we publish in a Book of Proceedings.

Here's pictures from all three days courtesy of Doc Searls

 

You belong at IIW! IIW is where you will meet people to help you solve problems and move your ideas forward. Please come! IIW 39 will be held October 29-31, 2024 at the Computer History Museum. We'll have tickets available soon.

Tags:




en

Can LLMs Provide References for Their Work? An Experiment

Summary: We know that LLMs hallucinate. And we know that we can overcome some of that problem with better prompts. But can LLMs provide references for their work? I conducted an experiment.

Recently my friend Scott Mace asked this on X in response to a post about the evolution of software and how LLMs will likely follow that same trajectory:

Yes, but how trustworthy will it be? Can I at least see the links it used to create its response?
From X
Referenced 2024-05-21T18:09:06-0400

The short answer is "no", but the real answer is a bit more nuanced because of how LLMs like ChatGPT work. First the short answer: LLMs don't understand what they're saying so they can't reference the material that it used to create a response. They don't work like that. They don't go out, do a bunch of research and then create a response. Instead lots (and I mean LOTS) of material is fed into the program that creates the model, a multi-dimensional matrix of word orders. Then when you ask a question ("give it prompt" in LLM-speak), it processes the question and generates text based on the probabilities of words in its model1. There's no way it can satisfy Scott directly because the model doesn't—can't, as far as I know—include the references that it used to create the text because it's generating it on the fly from material that has been thoroughly blended together.

But, in fairness, that's not what people do most of the time either. If you asked me over lunch or at the end of a tech presentation to describe zero trust and its pros and cons, I'd start talking. I wouldn't start looking up things on the web and somehow weave them into text complete with references. I'd go look for references if you asked me to back up something I said. So, let's try that with ChatGPT 4o. I gave it the following prompt:

You are a writer for a website focusing on technology. Your specialty is security. Write a 150 word explanation of zero trust with three pros and three cons.

ChaptGPT answered with this text:

Zero Trust is a security model based on the principle of "never trust, always verify." Unlike traditional security models that assume everything inside the network is safe, Zero Trust assumes that threats can exist both inside and outside the network. It requires strict identity verification for every user and device attempting to access resources, regardless of their location.

Pros:

  1. Enhanced Security: By continuously verifying users and devices, Zero Trust reduces the risk of breaches and unauthorized access.
  2. Minimized Attack Surface: It limits access to only what is necessary, reducing potential entry points for attackers.
  3. Improved Compliance: Helps meet regulatory requirements by ensuring strict access controls and logging all access attempts.

Cons:

  1. Complex Implementation: Deploying Zero Trust can be complex and time-consuming, requiring a significant overhaul of existing systems and processes.
  2. Increased Costs: The initial investment in technology and training can be high.
  3. User Experience Impact: Continuous verification can lead to friction and inconvenience for users if not implemented smoothly.

Zero Trust is essential for modern cybersecurity, but it requires careful planning and resources to implement effectively.

That's pretty good. But what if we need some references to other material to back up the pros and cons? I asked ChatGPT to supply them:

Now repeat that task, but this time include references as hyperlinks to back up each pro and con.

ChaptGPT answered with this text:

Zero Trust is a security model based on the principle of "never trust, always verify." Unlike traditional security models that assume everything inside the network is safe, Zero Trust assumes that threats can exist both inside and outside the network. It requires strict identity verification for every user and device attempting to access resources, regardless of their location.

Pros:

  1. Enhanced Security: By continuously verifying users and devices, Zero Trust reduces the risk of breaches and unauthorized access (CSO Online).
  2. Minimized Attack Surface: It limits access to only what is necessary, reducing potential entry points for attackers (NIST).
  3. Improved Compliance: Helps meet regulatory requirements by ensuring strict access controls and logging all access attempts (Gartner).

Cons:

  1. Complex Implementation: Deploying Zero Trust can be complex and time-consuming, requiring a significant overhaul of existing systems and processes (Forrester).
  2. Increased Costs: The initial investment in technology and training can be high (ZDNet).
  3. User Experience Impact: Continuous verification can lead to friction and inconvenience for users if not implemented smoothly (TechRepublic).

Zero Trust is essential for modern cybersecurity, but it requires careful planning and resources to implement effectively.

That looks great! Nice references for each bullet. There's just one problem. All the links, except the NIST reference, are dead. I don't know if they're wrong, made up, or stale. I tried finding content on a few of the sites by searching and came up dry. As I heard Johannes Ernst say once, ChatGPT is a "large language model" not a "large fact model" and this bears that out.

Still, asking for references or evidence for statements is something people are going to want. So, I tried a different tack. This time I asked this:

Why do you say complex implementation is a problem for zero trust? Can you give me a few references on that I can read myself?

ChatGPT responded with this:

Implementing a Zero Trust security model can be challenging for several reasons:

  1. Overall Complexity: Zero Trust requires a comprehensive understanding of your network's intricacies, including users, devices, applications, and data. This can involve significant changes to existing infrastructure, which can be disruptive and costly. Organizations need to be prepared for the extensive planning and resources required for successful implementation​ (Help Net Security)​​ (Enterprise Networking Planet​).
  2. Legacy Systems: Many organizations have legacy systems that are not designed to operate within a Zero Trust framework. These systems might require different security measures or even complete replacement, adding to the complexity and cost (Help Net Security)​​ (Enterprise Networking Planet​)
  3. Cultural Shift: Zero Trust is not just a technological shift but also a cultural one. It requires continuous verification and strict access controls, which can lead to user frustration and resistance if not managed properly. Ensuring user buy-in and minimizing disruption to workflows through training and communication is essential (Deloitte United States)​​ (Guidehouse).
  4. Resource Intensive: Implementing and maintaining Zero Trust can put a strain on IT resources due to the need for continuous monitoring and management. The need for advanced security tools and ongoing updates further adds to the resource demands (Help Net Security)​​ (Enterprise Networking Planet​).
  5. Stakeholder Alignment: Achieving buy-in from all stakeholders and aligning them with the Zero Trust principles is critical. This requires a coordinated effort to educate stakeholders, prioritize gaps, and ensure consistent understanding and application of Zero Trust principles across the organization (Deloitte United States)​​ (Guidehouse).

These challenges highlight the importance of a phased and well-planned approach to Zero Trust implementation, considering both technological and human factors. For more detailed insights, you can refer to articles from Help Net Security and Guidehouse.

Much better. The links in the bullets all work, but the ones at the end don't. The articles it references aren’t very detailed, so I wouldn’t say they’re stellar references, but at least there’s a pointer to outside material that discusses similar challenges. So, partial success.

I've found that when you're using ChatGPT to do research, treating it like a librarian and asking questions that follow up are the best way to gain confidence that the material is correct and find the supporting material, just as I did above. I'm sure you could wrap additional helper functions around an LLM to make getting references easier. But for now interrogation through chat is the best way to get comfortable with the results.


Notes

  1. Yeah, this is really simplified and thus wrong, but it's directionally correct. For a better explanation, see What Is ChatGPT Doing … and Why Does It Work?.

Photo Credit: Older Man Talking to Robot Librarian from DALL-E (public domain) Prompt: draw me a rectangular picture of an older man talking with a robot librarian. Use earth tones.

Tags: