20th She’s Geeky!!! Jan 29-30th Mountain View

I’m super excited about the 20th She’s Geeky Unconference coming up January 29th and 30th in Mountain View. I’m going to be facilitating. So it will be extra fun. To celebrate our 20th She’s Geeky we are offering a special 20% off ticket price register with the dicount code: MYGIFT20. Can’t commit to two days? The MYGIFT20 code is also valid for one-day registrations. To register go to www.shesgeeky.org. Here is a flyer for you to print out for your office. SGBA_2016_Flyer_010616
About She’s Geeky: Inspiring each other, creating vital networks, and sharing skills are the backbone of our events. Without places to re-energize and networks that support them, women who have done the hard work of developing their skills to work in STEM may drop out after just a few years in their eld. We want to improve the situation of women in STEM elds, increase retention Continue reading "20th She’s Geeky!!! Jan 29-30th Mountain View"

Grace Hopper Celebration and Presentation – Ethical Market Models.

In mid-October I had the opportunity to attend the Grace Hopper Celebration for Women in Computing for the first time. Here is a link to the paper that I presented – MarketModels-GHC Here are the slides
I also had the pleasure of working on a Birds of a Feather Session with Roshi from Google – she works on their identity team and was the one who asked me work on the session with her along with encouraging me submit a proposal for a lighting talk.
We had a great discussion about the internet of things and considering various ideas about what internet of things things…we might invent and how we might identify ourselves to them.
The conference is really a giant job fair for undergaduate women CS majors. There is not a lot there for mid-career women, all of the ones I Continue reading "Grace Hopper Celebration and Presentation – Ethical Market Models."

Thinking Ahead: Sean some people did…you didn’t.

So the Guardian is reporting about Sean Parkers remarks at the Techonomy conference. Thinking ahead.
None of us could possibly have understood what it would mean to have a billion or two billion people potentially using these platforms regularly,” said Parker. “That wasn’t something that factored into anyone’s analysis in the starting of these companies. You just want to be a successful company. You want to understand the mechanisms that work, you want to play into them, you want to reinforce them, you want to be a successful company.”
While it is refreshing to hear some self reflection after the fact about the consequences of building a social platform driven by profit with an incentive to get people to engage with it – personal and social costs be-dammed. I think people did for-see and could understand some of the negative effects he is discussing – the problem is they Continue reading "Thinking Ahead: Sean some people did…you didn’t."

I’m Quoted in Guardian Article re: Ellen Pao

Yesterday a reporter called me up and asked me for comment on Ellen Pao. I said “What did you expect?” It became the headline! – I continued “Ellen was at the center of a high-profile sexual discrimination suit versus a major VC firm and she was put in charge of the teenage boy section of the internet. What did you expect was going to happen? It was inevitable that they would turn on her,” You can read the whole article here – I wasn’t the only one unsurprised by what happened. :)

‘What did you expect?’ Women in tech reflect on Ellen Pao’s exit from Reddit

Enabling Multi-Stakeholder Consensus on Cybersecurity Issues

My friend Allen who was at Brookings got a job with NTIA to figure out what issues to focus on and how to get multi-stakeholder collaboration on cyber security issues.  Because he asked me to respond I took the time to give him my thoughts and input drawing on my experience with the attempts by NSTIC to do this same thing.  Here is the PDF document. IPTF-Kaliya-2 I will in time work to publish it in blog sized sections online so it is more internally linkable (starting with an index from this post). Until then enjoy.  

#mynameis my statement for the virtual press kit

I just wrote this up for the virtual press kit for the #mynameis protest.   With its real name / authentic name policy Facebook is violating the rights and dignity of thousands if not millions. Individuals of all stripes have authentic names that are not found on any of their legal paperwork.  In common law countries we have the right to define our own name and there rights need to be respected online. Identity is contextual. That is the same person may use different names authentically in different social contexts – within the Drag Queen and LGBT community – one name Lil Hot Mess for example and in a professional day job a completely different name – more likely one on formal legal paperwork but not necessarily.  These different contexts have their own contextual authenticity. Google+ when it began several years ago also had a real name or Continue reading "#mynameis my statement for the virtual press kit"

Ello….on the inside

So. I FINALLY got my invitation to Ello. I go in…make an account. I check the Analytics section.
Ello uses an anonymized version of Google Analytics to gather and aggregate general information about user behavior. Google may use this information for the purpose of evaluating your use of the site, compiling reports on site activity for us and providing other services relating to site activity and internet usage. Google may also transfer this information to third parties where required to do so by law, or where such third parties process the information on Google’s behalf. To the best of our knowledge, the information gathered by Google on Ello’s behalf is collected in such a way that neither Ello, nor Google, can easily trace saved information back to any individual user. Ello is unique in that we offer our users the option to opt-out of Google Analytics on the user settings Continue reading "Ello….on the inside"

IIW is early!! We are 20!! We have T-Shirts

Internet Identity Workshop is only a month away. April 7-9, 2015 Regular tickets are only on sale until March 20th. Then prices to up again to late registration. I’m hoping that we can have a few before we get to IIW #20!! Yes it’s almost 10 years since we first met (10 years will be in the fall). I’m working on a presentation about the history of the Identity Gang, Identity Commons and the whole community around IIW over the last 10 years. Where have we come from?…leads to the question…. where are we going?  We plan to host at least one session about these questions during IIW. It goes along with the potential anthology that I have outlined (But have a lot more work to get it completed).

IIW topics so far

We keep track of topics folks want to talk about on our Identity Commons wiki. I figured I would pull the list out from there and share it here…Its looking good so far. What topics are you planning to present about or lead a discussion about at this IIW?
  • Notification management – Notifs
  • unhosted identity
  • Redelegation of OAuth bearer tokens
  • “OpenID Connect certification
  • Proof of Possession”
  • Trust-elevation (adaptive access)
  • IdM for future scientific collaborations
  • I am a member of the W3C Credentials Community Group (http://opencreds.org) and will present status/progress/goals/roadmap/use cases and how they relate to other identity initiatives.
  • OpenID Connect mobile profile
  • “Consent management UI and internals International consent issues”
What are you hoping to learn about or hear a presentation about at IIW?

Internet Identity Workshop #20 is in April !!

IIW is turning 20 ! That is kind of amazing. So much has evolved in those 10 years.
So many challenges we started out trying to solve are still not solved. I actually think it would be interesting as we approach this milestone to talk about what has been accomplished and what we think is yet to be accomplished. I am working on organizing a crowd funding campaign to support completing an anthology that I have outlined and partially pulled together. I will be asking for your support soon. Here is the post on my blog about it. In the mean time tickets for IIW are up and for sale! You can also order a special T-shirt we are designing especially for the occasion.

ID Anthology – the community “cannon”

A few years ago I pulled together the start of a community anthology.
You could think of it as a cannon of key blog posts and papers written in the Identity Gang and circulated around the Internet Identity Workshop and other conferences back in the day like Digital Identity World. I think with IIW coming into its 10th year and #20 and #21 happening this year the time is right to make a push to get it cleaned up and actually published. We need to make the important intellectual and practical work done thinking and outlining digital identity that this community has done .  I also have included works that highlight key issues around user-centrism and identity that originated from outside the community of the identerati. I am working on organizing a crowd funding campaign to raise a small amount to work with a professional editor and type setter get Continue reading "ID Anthology – the community “cannon”"

A Preliminary Mapping of the Identity Needs in People’s Life Cycles

This start of a paper and idea for an interactive Exercise to be done at the ID360 Conference was written by myself and Bill Aal. It was submitted to the 2014 ID360 Conference put on by the Center for Identity at the University of Texas at Austin. Over people’s life cycles there are many different “identity events” that occur. While considering how people interact with an identity ecosystem the whole range of lifecycle events must be considered not just those in mid-life career people.  We present a draft Field Guide to the different stages of life naming different key events and contextualizes what identity needs they might have. We also explore a user centric view of the hat looks at the digital lifecycle from the perspective of our needs as people in a social context. This may be contrasted with a view of the digital life cycle from governmental, Continue reading "A Preliminary Mapping of the Identity Needs in People’s Life Cycles"

The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 1 Intro + What is Identity

This paper is still being worked on. I submitted it to the 2014 ID360 Conference hosted by the Center for Identity at the University of Texas at Austin and was sent to present it there until I had to back out because I was still sick from attending the NSTIC meeting in San Jose 2 weeks before. Another version will be submitted for final publication – so your comments are welcome.

Introduction

I was attending a day long think tank called Forces Shaping the Future of Identity hosted by the Office of the Director of National Intelligence and facilitated by the Institute for the Future. A man in the audience pipped up “Are we going to Define what we mean by Identity?” I smiled :).  One can’t go very far in a conversation about identity before someone asks “that” question. It always is asked when space is opened Continue reading "The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 1 Intro + What is Identity"

The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 2: Names

This paper is still being worked on. I submitted it to the 2014 ID360 Conference hosted by the Center for Identity at the University of Texas at Austin and was sent to present it there until I had to back out because I was still sick from attending the NSTIC meeting in San Jose 2 weeks before. Another version will be submitted for final publication – so your comments are welcome. Part 1: Intro + hat is Identity?   Part 3: Identifiers  Part 4: Name Space, Attributes and Conclusion. This is Part 2:

Names

Names are what we call ourselves and what others call us. They are a special kind of identifier because they are the link between us and the social world around us. We present ourselves using names so people know how to refer to us when talking to others or call us when they are talking to Continue reading "The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 2: Names"

The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 3: Identifiers

This paper is still being worked on. I submitted it to the 2014 ID360 Conference hosted by the Center for Identity at the University of Texas at Austin and was sent to present it there until I had to back out because I was still sick from attending the NSTIC meeting in San Jose 2 weeks before. Another version will be submitted for final publication – so your comments are welcome. Part 1:  Intro + hat is Identity?   Part 2: Names   Part 4: Name Space, Attributes and Conclusion. This is Part 3:

Identifiers

For people Names are a special class of Identifiers. They are both self-asserted by people and are used to refer to them and acknowledge them in social context.

System Identifiers

In systems, bureaucratic, digital and techno-bureaucratic identifiers are alpha numeric string pointers at/for people in systems. This may seem simple but their are many different Continue reading "The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 3: Identifiers"

The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 4: Name Spaces, Attributes, Conclusion

This paper is still being worked on. I submitted it to the 2014 ID360 Conference hosted by the Center for Identity at the University of Texas at Austin and was sent to present it there until I had to back out because I was still sick from attending the NSTIC meeting in San Jose 2 weeks before. Another version will be submitted for final publication – so your comments are welcome. Part 1: Intro + What is Identity?   Part 2: Names   Part 3: Identifiers This is Part 4:

Name Spaces

Different identifier systems work differently some originate from physical space and others operate purely in the digital realm.

Local

A great example of a local name space in the physical world is a school classroom. It is not uncommon in american classrooms that when there is a name space clash – that is two people have the same Continue reading "The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 4: Name Spaces, Attributes, Conclusion"

Field Guide to Internet Trust Models: The Sole Source

Sole Source

A Sole Source is an organization that acts as identity provider (IdP) and relying party (RP) for itself. This organization issues all identities that it recognizes, and only trusts identities that it has issued. An organization like this does not federate identities at all. Because it does not connect to anything else, this model is sometimes referred to as a Silo, an Identity Island, or a Standalone Domain. The service provider performs its own verification and dictates governance, privacy, and technical terms to all participants.
There is minimal – if any – negotiation between the requester and the service provider. The service provider manages the entire account lifecycle from creation through retirement. Examples
Historically, this has been the most common identity model because it can be implemented simply and gives the service provider the most control. Large, consumer-facing services like eBay, Facebook, and Yahoo! were created
The Sole Source identity model
Continue reading "Field Guide to Internet Trust Models: The Sole Source"

Field Guide to Internet Trust Models: Open Trust Frameworks

A Trust Framework is a specification that describes a set of identity proofing, security, and privacy policies. The framework is authored by subject matter experts, and is written with the intent that compliance can be assessed. The framework also lists the qualifications that an assessor must have in order to judge compliance.

A Framework Listing Service provides a publicly visible location where trust frameworks can be published and tracked. The listing service sets guidelines for acceptable frameworks and accredits assessors to verify that services implement the frameworks properly.

Examples: The Open Identity Exchange (OIX), Kantara Initiative, and InCommon operate framework listing services. A Framework Creator authors a trust framework that specifies identity validation policies and publishes it to a Framework Listing Service. The framework may also specify the qualifications required in order to be a valid assessor of the policy.

When to use: This should be used by networks who Continue reading "Field Guide to Internet Trust Models: Open Trust Frameworks"