E-Learning 3.0 Newsletter

Newsletter archives are here

Public Keys and Private Keys

Today's newsletter includes a video and some resources discussing two-factor authentication, public and private keys, and Keybase. Like many of the other topics in the course, this single day's focus could b an entire course in its own right. I hope I've done the topic some justice. Considering the important role it will play in the future, it deserves to be highlighted.

Meanwhile we have identity graphs coming in from all corners. I hope you'll take the time to look at and comment on each other's graphs. I think, again, that the diversity in the responses raises some interesting questions. As for my identity graph, you'll find it near the end of my video. (Note, where I say "only someone with Alice's public key can decrypt the message" I actually meant to say "only someone with Alice's private key can decrypt the message.")


We had our fifth online activity, this time with Maha Bali. You can view the event video here: https://el30.mooc.ca/event/83. We covered a lot of ground in our talk, considering what things compose identity, whether they are internal or external, how our activities and identity relate, and several of Maha's own activities, including Virtually Connecting (see below) and her ongoing course (also see below).


Yubico, 2018/11/15

As explained on the Yubico website, "U2F is an open authentication standard that enables internet users to securely access any number of online services with one single security key instantly and with no drivers or client software needed.  FIDO2 is the latest generation of the U2F protocol."

Web: [Direct Link] [This Post]

Public-key cryptography
Wikipedia, 2018/11/15

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. This accomplishes two functions: authentication, where the public key verifies that a holder of the paired private key sent the message, and encryption, where only the paired private key holder can decrypt the message encrypted with the public key.

Web: [Direct Link] [This Post]

Keybase.io - Downes
Stephen Downes, Keybase, 2018/11/15

This is my Keybase page. Here's what Keybase says about itself: "Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked." See also (very technical) Keybase for Everyone. And Keybase writing to the blockchain.

Web: [Direct Link] [This Post]


#El30 Task: Identity Graph
Roland, Learning with Moocs, 2018/11/15

In our course E-Learning 3.0 (#el30) facilitator Stephen Downes asked us to create an identity graph. We should not use a node “me”, “myself” or similar. I made a mind map using Mindmaster, but I dislike the fact that the format seems to impose a central node. I put buddhism/humanism central, since that are core […]

Web: [Direct Link] [This Post]

E-Learning 3.0 : Identity Graphs
jennymackness, e-learning 3.0 – Jenny Connected, 2018/11/15

We are now in the fourth week of this E-Learning 3.0 open course/MOOC. The task for this week is to create an Identity Graph, which Stephen Downes (convener of this course) has outlined as follows: Identity – Create an Identity Graph We… Continue reading →

Web: [Direct Link] [This Post]

Messing Around With Identity Graphs
dogtrax, EL30 – Kevin's Meandering Mind, 2018/11/15

For the E-Lit 3.0 course, Stephen Downes has us pondering identity and graphs, with a focus on Identity Graphs. These are used by marketers to fine-tune who we are, using our data trails, in order to push their products our way. Stephen envisions a different way in the Web3 world, where data will be used […]

Web: [Direct Link] [This Post]

Self-Control Still Difficult!
noreply@blogger.com (Apostolos K. ("AK")), Multilitteratus Incognitus, 2018/11/15

Attempt at witty title probably failed :-) I guess I am a little rusty  with creating meaningful blog titles since I have not been blogging frequently recently.  Oh well. I will get back into the swing of things once I finish my EdD...or not... ;-) In any case, I am catching up with #el30, more specifically last week's guest Ben Werdmuller (see recording here). Interesting fun fact - Ben is the creator of Elgg, which is the platform that Athabasca University's "Landing" runs on. There were quite a few interesting things that came out of the conversation but there were two that really stuck out to me.

Web: [Direct Link] [This Post]

Week 4 El30: Graphs And Decentering The Self
Brainstorm in Progress, 2018/11/15

“The individual has always had to struggle to keep from being overwhelmed by the tribe. If you try it, you will be lonely often, and sometimes frightened. But no price is too high to pay for the privilege of owning … Continue reading →

Web: [Direct Link] [This Post]

Course Newsletter RSS

A course RSS feed is now available. Now you don't need to read the newsletter or even visit the website - you can take this course from the comfort of your own feed reader, WordPress, gRSShopper application, or whatever. Here it is: https://el30.mooc.ca/course_newsletter.xml