To prepare for the panel discussion at the Cloud Identity Summit 2012, I was looking back to my old blog posts. Then, I found this…
View More Requirements to Digital Identity back in 2004Category: privacy
Analyzing Yahoo! Voices Password Leakage
Lot’s of articles appeared on the Yahoo! Voices’ password leakage on the 11th. Many people seem to be assuming that Yahoo!s password has been leaked,…
View More Analyzing Yahoo! Voices Password LeakageTrusted Federal Systems now the NSTIC ID Ecosystem Steering Group Secretariat
I just got this message from NIST 20 minutes ago. Identity Ecosystem Steering Group’s secretariat was awarded to Trusted Federal Systems (TFS). The first in-person meeting…
View More Trusted Federal Systems now the NSTIC ID Ecosystem Steering Group SecretariatIs Facebook “Like” button tracking you?
Since I am using it on this blog also, I probably should not talk loudly, but I feel creepy about the Facebook “Like” button. If…
View More Is Facebook “Like” button tracking you?Why “privacy” confuses people
Privacy, whether in the east or west, is a word talked in a vague sense leading to much confusion. In this article, I will try…
View More Why “privacy” confuses peopleOpenID Connect IdP on iPhone
As part of the exercise to see if OpenID Connect Messages 1.0 were written appropriately so that other bindings can be produced, Jun Eijima and…
View More OpenID Connect IdP on iPhone2012 NSTIC/IDtrust Workshop Panel topics?
So, I will be a panelist in the following workshop. 2012 NSTIC/IDtrust Workshop: “Technologies and Standards Enabling the Identity Ecosystem” March 13-14, 2012 NIST –…
View More 2012 NSTIC/IDtrust Workshop Panel topics?