The Power of a Secret

Photo by on

Note: This post is the sole opinion of the author based on knowledge and experience gained at the time. The author recognizes that there may be errors and biases, and welcomes constructive feedback to correct or ameliorate.

We all like secrets. When we possess a secret, it gives us a heightened sense of individuality — that we know some that nobody else knows — giving us a special perspective or an option for the future that only we can exercise — in other words, .

It turns out, imaginary or not, secrets are fundamental to the power that we have as individuals and institutions in the digital realm. Passwords, codes — those things that grant us or enable us to grant special access to those things that valuable, like bank accounts, emails, or the drafts and finals of our deliberations, the list goes on.

It turns out, that up until, , secrets had a fundamental fault — we had to share them to use them. That meant you had to trust someone else, and that could eventually lead to the betrayal of your secret, and by extension, you.

In 1977, the public introduction of asymmetric cryptography heralded a new generation of secret capabilities. The first major capability was the establishment of shared secrets across insecure channels enabling encryption between two parties without the requirement of a secret backchannel. The second was enabling commitments using secrets that are not shared, more commonly known as digital signatures.

What had been discovered by Whitfield Diffie and Martin Hellman (and also Jame Ellis), is changing the world as we know it. It’s been only 43 years. Yes, that seems like an ice-age ago, but in the grand scheme of history, it is only a wink.

My concluding remark in this brief post is that (with apologies to BTO). I have been learning about many related schemes, based on that 1977 publicly-announced breakthrough: elliptic curves, homomorphic commitment schemes, proof-of-work, etc.

It’s one thing to understand these as mathematical, but it is another thing to understand what these things might be leveraged as institutional capabilities, either built by an institution itself or leveraged from an ecosystem that lets you keep your own secrets.

That’s the key — keeping your own secrets — keeping those things that give you the power.




Based in Ottawa. Does identity stuff. My tweets are my opinion but they can be yours too!

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Kandy Kingdom Hack Free Resources Generator

{UPDATE} Bingo Kingdom™ - Bingo Live Hack Free Resources Generator

CyberDefenders Write-up: BankingTroubles

{UPDATE} Sarutobi Island Hack Free Resources Generator

Information gathering using Discover

Mind the App!

“Defend the Web” write-up (Intro 11— file direction vulnerability)

What is GorillaDrops?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Tim Bouma

Tim Bouma

Based in Ottawa. Does identity stuff. My tweets are my opinion but they can be yours too!

More from Medium

What Type of Granola is Healthiest? The Kind You Make at Home.

bowl of granola with cashews on a gray surface.

Telepresence: Feel the reality

Telepresence Advance video conferencing Madman Technologies private limited services Hi-tech video conferencing

Leadership by Design: Lessons from the Pandemic Rodeo