Security Settings in .TEL - Webnames Blog

Security Settings in .TEL

Privacy and security are often among the early concerns voiced by people excited about the new .TEL names. Fortunately .TEL provides a way for each .TEL owner to easily set their own levels of security, based on their needs and comfort levels.

Once you’ve registered your .TEL name, you’ll be able to configure and manage the information through the TelHosting interface.

You’ll start by adding some contact information. For example:

• Home Telephone
• Work Telephone
• Cell Phone
• Work E-mail Address
• Gmail Address
• MSN Instant Message ID
• Work Website

Once the information is entered, you can create security groups to which users may be added. For example:

• Friends
• Family
• Coworkers
• Business Associates

From there, it’s simply a question of mapping contact information to security groups to determine who can see what information.














In this example, the only thing that a member of the general public could see is your work website address.

Friending Requests

To see more information, someone would have to send a “Friending” request. This is a request that includes their name, email address and a short message. You can manage your friending requests through the TelHosting interface and assign each requestor to the appropriate group. If you don’t know the friending requestor, simply decline the request.

1028 Bit Encryption

All private contact records (held as NAPTR records in the DNS) are encrypted with 1024 bit encryption, so unless you explicitly allow someone to see a record through the security groups you create and the friending requests you allow, there’s no way for them to see your information.

Public Key Encryption

The friending process is built on a popular and well used security model based on public and private “key” pairs. When you allow someone you’ve ‘friended’ to see secured information, the system encrypts the data using their public key. No one other than the recipient can unlock the data, but when the recipient receives the information, they can unlock it using their private key.

This is all managed transparently by the TelHosting software so it’s not something you need to be knowledgeable about in order to use it.


Click here for more information on .TEL


Posted in:

Domain Names Security