si

New Kia launches — EV9 and Carnival Limousine

Kia India unveils the EV9 e-SUV and Carnival Limousine, blending cutting-edge technology, luxury, and sustainability




si

Mutton soup is the signature dish of RL Cafe, a Kudumabashree outlet in Thiruvananthapuram

RL Cafe is run by Bindhu KV and her husband, Balachandran T, in Thiruvananthapuram




si

Watch | How is Thiruvananthapuram’s signature halwa made?

A video on ‘Halwa Veedu’, where a family has been crafting broken-wheat halwa for decades




si

Sampling traditional flavours of Singapore with Theobroma

Kainaz Messman of Theobroma talks about the learnings of traditional food from the food collaboration in Singapore




si

Chennai’s biryani ‘masters’ are experts at cooking massive feasts for thousands of people

Chennai loves its biryani. We meet three celebrated cooks from the city’s biryani hubs: Triplicane, Royapuram, and Periamet




si

Lazy Leopard in Gopalapuram aims to serve classic Neapolitan pizzas with spots and San Marzano tomatoes

Bringing ingredients and flavours all the way from Italy, Chennai’s newest pizzeria aims to serve authentic Neapolitan pizzas with a side of hot wings, creamy shrimp and warm garlic breads




si

Kongu style arisi paruppu sadam




si

Karnataka’s Kunbi women farmers hope to bring climate-resilient tubers to urban dining tables

Nestled within the buffer zone of the Dandeli-Anshi Tiger Reserve and the Karwar Territorial Forest Division, the Kunbi community hopes to find a new market for their climate-resilient tubers as indigenous ingredients in city chefs’ menus




si

Chef Ton, Pam & Varun unite for an Asian Invasion in Bengaluru

Chef Ton from Le Du in Bangkok, Chef Pam of Potong, also hailing from Bangkok, and Chef Varun Totlani from Masque in Mumbai, united in Bengaluru to co-host an elaborate ten-course meal




si

Simple thoran recipe with cabbage, carrots and beans (തോരൻ)




si

The late Annamma Mathew’s classic Kerala recipes come alive in a new cookbook

Kerala’s much-loved cookbook author, Annamma Mathew, more popularly known as Mrs K M Mathew’s culinary legacy comes alive in a new book




si

Column | Kolkata’s Western fantasy Christmas may be a tad tacky — but I always feel homesick for the city this season

In Kolkata, there’s always room for you at the Christmas party. And a slice of rich plum cake




si

At Chennai’s new rooftop bar, catch sunsets and sip on innovative cocktails like shiitake-infused whisky

Located on the 10th floor in Egmore, and spread across 4,500 square feet, Irida Skky Lounge focusses on technique-driven dishes and cocktails




si

A culinary adventure in Auroville: Explore authentic Korean cuisine at Nowana




si

Egypt's Sudanese refugees using rich cuisine to build new lives

Sudanese entrepreneur brings Sudan’s culinary traditions to Egypt, aiming to introduce Egyptian palates to Sudanese culture




si

Award-winning Idaaya premium sipping rum set to make a mark in Indian markets

Rooted in Indian culture, the homegrown dark sipping rum is created and bottled in Jammu and will soon be available in bars and restaurants across the country




si

Circars Bistro: A new hub for American and continental cuisine in Visakhapatnam

Circars Bistro, Visakhapatnam’s newest American and continental dining space, offers a smorgasbord of offerings for the palate









si

Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing - Video Games Chronicle

  1. Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing  Video Games Chronicle
  2. Lego Horizon Adventures Review  IGN
  3. Lego Horizon Adventures: How Long to Beat (& Chapter List)  GameRant
  4. Lego Horizon Adventures is a delightful, kid-friendly twist on Horizon Zero Dawn  Polygon
  5. How LEGO Horizon Adventures was built with real LEGO bricks, out Nov 14  PlayStation





si

Israel's West Bank settlers hope Trump's return will pave the way for major settlement expansion - ABC News

  1. Israel's West Bank settlers hope Trump's return will pave the way for major settlement expansion  ABC News
  2. Ex-Trump aides warn Israeli ministers not to assume he’ll back annexation in 2nd term  The Times of Israel
  3. This Is How Netanyahu Will Annex the West Bank  Haaretz
  4. Eyeing Trump support, Israeli minister pushes for West Bank settlement annexation  CNN







si

How to Speak Spanish (Basics)

Believe it or not, Spanish is the second-most spoken language on the planet. Developing your Spanish-speaking skills is a great way to meet new people, communicate with Spanish speakers, and immerse yourself in a new way of thinking. If you want to speak Spanish, start by learning the common phrases and vocabulary terms. Once you feel a little more comfortable with the language, you can learn a lot more by immersing yourself in the language, taking classes, and practicing to develop fluency in the language.




si

Bengaluru is the top option for Indian non-residents looking to buy mid-range and affordable homes

Data gathered from several consulting firms by HT Digital indicated that Bengaluru has maintained its position as the top option for non-resident Indians wishing to invest in India’s residential real estate market, particularly those seeking affordable and mid-segment homes.  The … Continue reading



  • Real Estate News
  • Affordable Housing
  • Bengaluru real estate
  • Bengaluru's real estate market
  • Indian real estate
  • Indian Real Estate market

si

Tenant news to rejoice about! The April-June quarter saw an average price correction of 5-10% in Bengaluru’s rental housing market

Bengaluru’s rental housing market saw an average price correction of 5-10% during the April-June quarter of the current calendar year, according to local brokers who spoke with HT.com. This news should cheer up tenants in the city. The primary reasons … Continue reading



  • Real Estate News
  • Bengaluru's real estate
  • Bengaluru's real estate market
  • Bnegaluru's rental market
  • Indian real estate
  • Indian Real Estate market

si

India’s commercial real estate market: Surpassing the global recession

Due to severe downturns in the global economy in 2023, the commercial real estate market saw a 66% annual decline in investments. Significant markets such as the US and Europe saw a 25% decline in leasing activity. The global commercial … Continue reading



  • Real Estate News
  • India's commercial market
  • India's real estate
  • Indian Real Estate market

si

Govt should prioritize housing to boost the real estate market, according to developers

This year’s budget, which sets up the housing sector, will not only help the one crore urban poor and middle-class families who lack a place to reside.  It will also boost the real estate market and open new doors for … Continue reading




si

Mumbai Rains: During the monsoon, the walk-in homebuyer’s activity slows down, impacting housing transactions

The real estate industry in Mumbai has suffered the most as a result of the heavy rains and the numerous cases of waterlogging that have been reported. Real estate experts claim that between July and August, during the monsoon, walk-ins … Continue reading



  • Real Estate News
  • Indian real estate
  • Indian Real Estate market
  • Monsoon effect's on Real Estate
  • Mumbai's real estate
  • Mumbai's real estate market

si

The real estate sector will see positive changes in the budget for 2024

This budget’s extensive measures demonstrate the government’s dedication to the real estate industry’s overall growth, which makes it a major driver of the country’s economic expansion.  The Finance Minister, Nirmala Sitharaman, unveiled the 2024 Union Budget, which includes some ground-breaking … Continue reading




si

12 Hidden iPhone Features You’ll Wish You Started Using Sooner

Try these 12 incredible iPhone tips and tricks for 2024 that will change the way you use your iPhone! From a hidden sleep timer in the Clock app to bypassing annoying ads in Safari WITHOUT an ad blocker, these hacks will save you time and headaches!




si

Trump’s Vision for Flying Cars Gains Credibility with Addition of UFO Expert

Trump's flying car initiative gains momentum as UFO expert Dr. Michael Salla signals potential involvement, bringing advanced aerospace expertise to ambitious urban development plan.




si

Department of Interior websites shut down for security reasons

A federal judge in Washington yesterday ordered the Interior Department to shut down most of its employees' Internet access and some of its public Web sites after concluding that the agency has failed to fix computer security problems that threaten...




si

GPO signs on to using PKI

One of the issues regarding information on the web is ensuring authenticity, especially in regards to government information. The GPO recently announced they will be soon begin using public-key infrastructure and digital signatures to ensure authenticity of documents released online....




si

Web 2.0 is Collapsing Under its Own Weight

Summary: The overhead of performing even simple tasks online is getting larger and larger. I question the security of almost all these supposedly "secure" messaging systems. And I'm tired of the 'Utopia of Rules' mindset pervasive in every organization. It's exhausting how they expect customers to constantly adapt to their needs.

I don't know if you recall the game Kerplunk. It's a classic children's game that has been around for decades. I remember playing it with my sister. The basic setup involves a transparent plastic tube, a number of sticks, and marbles. The sticks are threaded through the tube to form a web or nest at the bottom on which the marbles rest. We'd take turns removing a stick at a time, trying not to let any marbles fall through the web and out of the tube. At some point, the remaining sticks can't hold the marbles and everything falls down.

The modern web reminds me more and more of a big Kerplunk game and I think the marbles are about to fall. What started out as an easier way to do things like shop, bank, and get health care information has become increasingly complex over time. More and more of the email I receive seems to be simply directing me to log into some bespoke system to retrieve a message or engage in some workflow. And even with a password manager, the act of logging in is often a chore with different user interfaces, custom MFA requirements, and weird rules for passwords. Once you're on the system, session time-outs induce their own form of anxiety since stepping away for a few minutes to attend to something else might require going through the whole Kafkaesque process all over again. The modern web has turned into a dystopian theater of the absurd where even reading a simple appointment reminder from your doctor requires several minutes of stress-inducing interaction with baroque systems and processes.

And it's not just doctors, of course, banks, government agencies, hospitals, ecommerce sites, and customer service systems all adopt these special purpose messaging systems. If you ask these organizations why they use bespoke messaging systems, they'll list things like "timely and improved communication," "convenience," and "privacy and security." But the real reason is that it's more convenient for them because these systems are integrated with their backends and make their processes more manageable. There's certainly nothing about them that's more convenient, timely, or better than email for their customers1.

I also question the privacy and security premise. Email can be insecure. And your email provider can see the contents of your emails. But the messaging system run by your doctor or bank is likely less secure than the email systems run by Apple, Google, and the others. And achieving privacy by making everything incompatible so that you have to use a different system for each correspondent is like chopping off your finger to prevent hangnails.

How did we get here? Bureaucracy. Not just government bureaucracy, but bureaucracy of all kinds. In Utopia of Rules2, David Graeber talks about how power imbalances force the less powerful group to perform what he calls interpretive labor, the work of understanding and implementing what's better or more convenient for the more powerful partner. People are not equal participants in online interactions. We don't have the tools to be fully embodied online3. Because of this we are forced to play by the rules organizations online who are digitally embodied with servers, identity systems, customer management systems, and so on. And part of that is being forced to use their inconvenient and anemic messaging systems.

What's the answer? People need tools. I think digital wallets (a bad name for an important tool), autonomic (peer) identifiers with strong cryptography, and verifiable credentials are a huge step forward. These tools provide the means for people to be peers online rather that mere ghosts in someone else's machine. That's why I insist on using the term self-sovereign rather than decentralized to describe these systems. Cogito Ergo Sum.

Notes

  1. For a deeper dive into why one-off messaging systems are never as good as email, see Rich Sharing and Personal Channels. Email and other useful messaging systems exhibit a property called rich sharing that makes them much more robust that the simple idea of "sharing a message" would bring to mind.
  2. If you're interested in power imbalances and how they come about, I can't recommend Graeber's book highly enough. He had such a keen understanding of this problem and wrote about it in a way that's both informative and entertaining.
  3. I talk about this in more detail in Chapter 17 of Learning Digital Identity when I discuss authentic digital relationships.

Photo Credit: Playing Kerplunk from DALL-E (public domain) Prompt: Draw a picture of a boy and girl playing kerplunk that's 1200x500 pixels

Tags:




si

Using X.509 Certs for DID Provenance

Summary: The abundance of X.509 certificate authorities who already perform identity proofing for businesses provides a rich resource that can be leveraged to boot the verifiable data ecosystem.

When you used a verifiable credential to prove something about yourself, the verifier can know cryptographically: (1) the identifiers for the issuer, (2) the credential hasn't been tampered with, (3) the credential was issued to you, and (4) the credential hasn't been revoked. These four checks are important because their establish the fidelity of the data being transferred. They don't, however, tell them whether they can trust the issuer. For that, they need to take the issuer's decentralized identifier (DID) that they got from credential presentation and determine who it belongs to.

At the most recent Internet Identity Workshop, Drummond Reed gave a session on how X.509 certificates could help with this. The first step, like always, is to resolve the DID and retrieve the DIDDoc that associates keys and endpoints with the DID. The endpoint can be an HTTP server and, of course, should have an X.509 certificate providing TLS security. That certificate, at the very least, has a a domain name to bind that to the certificate's public key. It can, if you pay for the feature, also include information about the entity that applied for the certificate. The certificate authority proofs that information and is vouching for it when they sign the certificate.

The key to making the X.509 certificate useful for checking the provenance of a DID lies in one key change. X.509 certificates can contain and extended field called a Subject Alternative Name. This following figure shows how it can help.

Using X.509 Certificates to establish the owner of a DID (click to enlarge)

In this figure:

  1. The issuer (Attestor) creates the DID they will use to issue the certificate along with its associated DIDDoc, including an HTTP endpoint for DID verification.
  2. Attestor applies for a X.509 certificate for that endpoint, including in the application the DID they created in (1).
  3. The certificate authority does it's usual proofing of the application and issues a certificate that includes the DID in the Subject Alternative Name field.
  4. The issuer creates a credential definition in the usual way that includes their DID and writes it to whatever Verifiable Data Registry their DID method dictates.
  5. Attestor issues a credential to a holder (Alice) using that credential definition.
  6. At some later time, Alice presents the credential to the verifier (Certiphi).
  7. Certiphi resolves the DID to get the DIDDoc and retrieves the verfication endpoint from the DIDDoc
  8. Certiphi retrieves the certificate for that endpoint1.
  9. Certiphi verifies the certificate by checking it's signature and ensures that the DID in the DIDDoc for the credential matches the one in certificate.2

The issuer's DID has now been tied in a verifiable way to whatever information is in the certificate. Provided the certificate includes information about the entity beyond the domain name, the verifier can use that information to determine whether or not the credential is authentic (i.e., issued by who the credential definition purports issued it). That might be all the evidence they need to determine whether to trust the entity. Certificate authorities could also issue verifiable credentials to the customer attesting the same verified claims—after all, it's one more product they can offer.

The benefit of doing issuer validation using X.509 certificates is that there are already many trusted X.509 certificate authorities in business who already do proofing of attributes about businesses. That's a huge chunk of the verifiable data ecosystem that doesn't need to be built because it can be leveraged. To make this work, digital certificate authorities would need to start offering to validate DIDs and include them in a certificate as a Subject Alternative Name. I don't discount that this will take some bureaucratic maneuvering. Certificate authorities will need to see a business opportunity. I'd love to see Digitcert or someone do a pilot on this.

Notes

  1. Note that this step might be combined with the previous step if the Verifiable Data Registry is the same server as the endpoint, but that's not necessarily going to be the case for a number of reasons.
  2. Note that this does not create a call back wherein Attestor can determine which credential was used, preserving the privacy of the presentation. Attestor does know one of its credentials has been presented to Certiphi. If this information leakage bothers you, then any web-based DID method is potentially a problem.

Tags:




si

Watch: Ambitious robot learns to clean bathroom sink by watching

Michael Franco, New Atlas, Nov 13, 2024

The depth and detail in this paper (8 page PDF) are daunting, but the gist, as summarized in this post, is straightforward: provided only with observations of a human cleaning (" using a so-called instrumented tool, which is a standard tool equipped with additional sensors") the front of an ordinary sink, a robot arm learn to clean entire sinks with varying surface topology. "The model implicitly learned the correct
tool orientation and position w.r.t. the freeform 3D surface." Michael Franco speculates, "a fleet of robots could learn the basic moves from each other through what's known as 'federated learning' and then they could apply those moves to their individual, specified tasks."

Web: [Direct Link] [This Post]




si

Meta taps US, UK universities to test VR in education, creates digital twin 'metaversities' in Europe

Paul Sawers, TechCrunch, Nov 13, 2024

According to this article, "Meta has launched a new partnership with a slew of universities in the U.S. and U.K., as it looks to ingrain VR across the education system." I guess it's a big deal (per Mixed, Upload, Social Media Today, Technopedia, ReadWrite, etc etc) but it's hard for me to stifle a yawn. It's not simply that I was here for the Second Life hype, it's that their product is a "digital twin" of the university - "environments that directly replicate their real-world campus counterparts" - the least imaginative use of any media ever. I think there's a lot of room for VR in education, but this announcement isn't it.

Web: [Direct Link] [This Post]




si

Site Search for All Agencies, Cities, Counties

It's Christmas. See the cool search tool set that Santa has left under the tree for you and your website!




si

Check Accessibility from Your Toolbar

Steve Faulkner recently released a tool for Internet Explorer called the Accessibility Toolbar. It provides one-click access to accessibility validators and has features that go beyond simple accessibility checks.




si

New Forums Based eDG Site

ITS has recently polled State agency developers for their ideas for a more collaborative eDG site that will better serve...




si

eDG Becomes a Community Site

The eDG Website is nearing another milestone. In a past meeting, we polled members to learn what improvements could make The eDG more useful. All present expressed interest in having a more interactive site. The new eDG, available April 21, is a PHP portal-driven site with more interactive features.




si

Better Compression with Brotli

Pssst… have you noticed your site loading a bit faster than usual? It’s not your imagination! We’re happy to let you know that we’ve rolled out Brotli to all of your WPMU DEV hosted sites, giving you on average 11.62% better compression than before (and faster sites as a result!) It’s a change that’ll make […]




si

Drama?! What Drama?! *Sips Tea*

Read to the end to see a cat who is definitely asleep and not up to ANYTHING suspicious… In today’s edition: Cheers to the WordPress Plugin Review Team for digging themselves out of one hell of a backlog. HeroPress celebrates folks who have used WordPress to make the world a better place, and we’re here […]




si

Introducing Expanded Webmail Plans To Support Your Business Growth

Great news for agencies, developers and freelancers! We’ve heard that while many of you love our Webmail service, the 5GB storage limit is getting tight. That’s why we’re introducing our new range of expanded Webmail plans to help take your email capabilities to the next level. More Space, More Flexibility, More Power We’re expanding our […]



  • WPMU DEV Products