Human Centered Security Podcast I was invited to join Heidi Trost to join her on my new podcast focused on Human Centered Security. We MyData Talk: From Data Protection to Data Empowerment (not an easy path) for the Technology Pragmatist This is the edited text of a talk that I gave during the first plenary session of the MyData Online In a digital age, how can we reconnect values, principles and rules? Who is the “we” - this piece is co-authored by Kaliya Young and Tony Fish who together have worked for Self-Sovereign Identity Critique, Critique /8 Now we are in the Meg Wheatly section of the article. I've been reading Meg's book since I read Leadership Self-Sovereign Identity Critique, Critique /7 This is the 7/8 posts addressing the accusation by Philip Sheldrake that SSI is dystopian. We have now gotten to Self-Soverieng Identity Critique, Critique /6 So Philip here is where you go off the rails to make the assertion that we working on SSI are Self-Sovereign Identity Critique, Critique /5 This is part 5 of 8 posts critiquing Philip's assertion that all of SSI is a Dystopian effort when its Self-Sovereign Identity Critique, Critique /4 Philip's essay has so many flaws that I have had to continue to pull it a part in ta series. Self-Sovereign Identity Critique, Critique /3 I will continue to lay into Philip for failing making broad sweeping generalizations about it that are simply not true Self-Sovereign Identity Critique, Critique /2 At one point in my career I would have been considered "non-technical". This however is no longer the case. I 1 2 3 … 111 Next »