Facebook is attracting a lot of attention from the identity community, with many of us signing up on the site. And the blog entries regarding the experience make for some interesting reading. Pamela Dingle blogged about the basic dilemma that most of us faced when we first signed up – our disinclination to give up
In a recent blog post (E-Passports equals E-pportunity for Hackers?), I touched on the security and privacy issues arising from the use of RFID technology in the context on the new e-passports. Now Scientific Technology Options Assessment (STOA), an arm of the European Parliament, has released a report (RFID and Identity Management in Everyday Life)
Wired contributor Scott Gilbertson recently ranted about how social networks are adding to the ubiquitous walled gardens on the web (Slap in the Facebook: It’s Time for Social Networks to Open Up). He talked about something that we are all a little weary of – having to set up the same relationships in each social
After a day and a half, I can safely say that Catalyst is living up to its reputation of being on the cutting edge of identity trends and issues. After a typically boisterous start to the conference on Wednesday, where Mike Neuenschwander set the tone by introducing a superhero called “Captain Controls“, the conference settled
That catchy slogan can only mean one thing – it’s time for the annual Catalyst Conference (US edition), hosted by the Burton Group. Running from June 25-29 in San Francisco, the event will once again aim to stir things up by bringing together people in a forum where debates will rage and ideas will fly.
I received this newswire story about a new company called safeTspace that claims to provide the kind of identity and age verification service that I blogged about a few weeks ago. Aimed at social-networking sites like MySpace, it combines an in-person registration process with biometric authentication to offer an unprecedented level of security for users.
I’m back at work after some much needed R&R, and as always it seems like I missed quite a bit while I was gone. The timing of my vacation meant that I missed last months IIW conference, where one of the main events was to be an identity card interoperability test involving Microsoft, Novell and
Second Life is an Internet-based virtual world developed by Linden Labs. It uses advanced virtual world technology to create what is, in essence, a highly sophisticated social networking application. Users of the system, called “Residents”, can explore, meet one another, socialize, participate in individual and group activities, create and trade items (virtual property) and services.
…we need to understand what user-centric identity is. That is the current state of discussion in the identity community. Many people are debating what user-centric identity is. Is it an architecture, is it a design philosophy, or is it a set of business agreements governing user interactions in certain systems? During the course of the
One area that I have been paying a lot of attention to recently is the scaldingly hot area of user-centric identity. No other area in identity management is generating as much interest in the community. While this is extremely gratifying (because the ultimate goal is to make our lives better and more secure, and who