How do I configure CodeB SMS for SMS Authenticity

To use the SMS validation feature of the CodeB app, please follow these three steps: Firstly, after installing the app, configure and confirm your mobile number in the “Settings” menu by selecting “Own Number” and pressing “OK”. Secondly, configure your carrier’s CodeB Identity Node by selecting “CodeB Identity” in the “Settings” menu. The default setting … Read more

Blockchain X.509 Certification Authority

Public Key Infrastructure (PKI) is the standard today to enable secure communication over the web, sign document or to encrypt sensitive data. PKI comprises digital certificates managed by the certificate authorities (CAs) to verify the user’s identity. However, the security of PKI is unfortunately reliant on the reliability of these third-party CAs. This serves as … Read more

Windows Credential Provider Support

Windows Credential Providers are the primary mechanism for user authentication—they currently are the only method for users to prove their identity which is required for logon and other system authentication scenarios. With Windows 10 and the introduction of Microsoft Passport, credential providers are more important than ever; they will be used for authentication into apps, … Read more

Identity Wallet now with distributed Document Vault

Storing and sharing your valuable documents in the cloud has many disadvantages such as lack of security, limited quotas and missing redundancies. CodeB’s Self-Sovereign Identities are built for the secure storage of valuable attributes and credentials. In combination with its distributed offchain storage system every identity contract can store and manage an unlimited amount of … Read more

Send authenticated but anonymous messages from Identity Wallet

Is the seemingly paradoxical notion of “Authenticated Anonymity” possible or is authentication essentially incompatible with anonymity? Anonymity and specifically sender anonymity have become essential requirements for many privacy-related applications. On the other hand, anonymity may be abused for various malicious activities. With the new feature “Authenticated Anonymity” CodeB addresses both with protocols for authenticated anonymous … Read more