None of us could possibly have understood what it would mean to have a billion or two billion people potentially using these platforms regularly,” said Parker. “That wasn’t something that factored into anyone’s analysis in the starting of these companies. You just want to be a successful company. You want to understand the mechanisms that work, you want to play into them, you want to reinforce them, you want to be a successful company.”While it is refreshing to hear some self reflection after the fact about the consequences of building a social platform driven by profit with an incentive to get people to engage with it – personal and social costs be-dammed. I think people did for-see and could understand some of the negative effects he is discussing – the problem is they Continue reading "Thinking Ahead: Sean some people did…you didn’t."
Join us its going to be great.
Ello uses an anonymized version of Google Analytics to gather and aggregate general information about user behavior. Google may use this information for the purpose of evaluating your use of the site, compiling reports on site activity for us and providing other services relating to site activity and internet usage. Google may also transfer this information to third parties where required to do so by law, or where such third parties process the information on Google’s behalf. To the best of our knowledge, the information gathered by Google on Ello’s behalf is collected in such a way that neither Ello, nor Google, can easily trace saved information back to any individual user. Ello is unique in that we offer our users the option to opt-out of Google Analytics on the user settings Continue reading "Ello….on the inside"
- Notification management – Notifs
- unhosted identity
- Redelegation of OAuth bearer tokens
- “OpenID Connect certification
- Proof of Possession”
- Trust-elevation (adaptive access)
- IdM for future scientific collaborations
- I am a member of the W3C Credentials Community Group (http://opencreds.org) and will present status/progress/goals/roadmap/use cases and how they relate to other identity initiatives.
- OpenID Connect mobile profile
- “Consent management UI and internals International consent issues”
So many challenges we started out trying to solve are still not solved. I actually think it would be interesting as we approach this milestone to talk about what has been accomplished and what we think is yet to be accomplished. I am working on organizing a crowd funding campaign to support completing an anthology that I have outlined and partially pulled together. I will be asking for your support soon. Here is the post on my blog about it. In the mean time tickets for IIW are up and for sale! You can also order a special T-shirt we are designing especially for the occasion.
You could think of it as a cannon of key blog posts and papers written in the Identity Gang and circulated around the Internet Identity Workshop and other conferences back in the day like Digital Identity World. I think with IIW coming into its 10th year and #20 and #21 happening this year the time is right to make a push to get it cleaned up and actually published. We need to make the important intellectual and practical work done thinking and outlining digital identity that this community has done . I also have included works that highlight key issues around user-centrism and identity that originated from outside the community of the identerati. I am working on organizing a crowd funding campaign to raise a small amount to work with a professional editor and type setter get Continue reading "ID Anthology – the community “cannon”"
IntroductionI was attending a day long think tank called Forces Shaping the Future of Identity hosted by the Office of the Director of National Intelligence and facilitated by the Institute for the Future. A man in the audience pipped up “Are we going to Define what we mean by Identity?” I smiled :). One can’t go very far in a conversation about identity before someone asks “that” question. It always is asked when space is opened Continue reading "The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 1 Intro + What is Identity"
NamesNames are what we call ourselves and what others call us. They are a special kind of identifier because they are the link between us and the social world around us. We present ourselves using names so people know how to refer to us when talking to others or call us when they are talking to Continue reading "The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 2: Names"
IdentifiersFor people Names are a special class of Identifiers. They are both self-asserted by people and are used to refer to them and acknowledge them in social context.
System IdentifiersIn systems, bureaucratic, digital and techno-bureaucratic identifiers are alpha numeric string pointers at/for people in systems. This may seem simple but their are many different Continue reading "The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 3: Identifiers"
Name SpacesDifferent identifier systems work differently some originate from physical space and others operate purely in the digital realm.
LocalA great example of a local name space in the physical world is a school classroom. It is not uncommon in american classrooms that when there is a name space clash – that is two people have the same Continue reading "The Field Guide to Identity: Identifiers, Attributes, Names and More. Part 4: Name Spaces, Attributes, Conclusion"
Sole SourceA Sole Source is an organization that acts as identity provider (IdP) and relying party (RP) for itself. This organization issues all identities that it recognizes, and only trusts identities that it has issued. An organization like this does not federate identities at all. Because it does not connect to anything else, this model is sometimes referred to as a Silo, an Identity Island, or a Standalone Domain. The service provider performs its own verification and dictates governance, privacy, and technical terms to all participants.
There is minimal – if any – negotiation between the requester and the service provider. The service provider manages the entire account lifecycle from creation through retirement. Examples
Historically, this has been the most common identity model because it can be implemented simply and gives the service provider the most control. Large, consumer-facing services like eBay, Facebook, and Yahoo! were created
A Trust Framework is a specification that describes a set of identity proofing, security, and privacy policies. The framework is authored by subject matter experts, and is written with the intent that compliance can be assessed. The framework also lists the qualifications that an assessor must have in order to judge compliance.
A Framework Listing Service provides a publicly visible location where trust frameworks can be published and tracked. The listing service sets guidelines for acceptable frameworks and accredits assessors to verify that services implement the frameworks properly.
Examples: The Open Identity Exchange (OIX), Kantara Initiative, and InCommon operate framework listing services. A Framework Creator authors a trust framework that specifies identity validation policies and publishes it to a Framework Listing Service. The framework may also specify the qualifications required in order to be a valid assessor of the policy.
When to use: This should be used by networks who Continue reading "Field Guide to Internet Trust Models: Open Trust Frameworks"