Welcome to the Identity Woman Blog I am an advocate for the rights and dignity of our digital selves. Where I am in the World Latest Media & Papers Posts about Identity & NSTIC Organizations and Events I share leadership in Click more to see below the line and find out all this.
I had a great time this last week at the Internet Identity Workshop. So great I think there will be several weeks of posts about highlights and insights. One of the surprising things was a conversation I had with Jogi leader of MyData after the conference. He said he had been very influenced by a […]
I was explaining to my friends Tony Fish and Lubna Dajani why I was so excited about the new self-sovereign identity. Some things that are exciting to me aren’t even clear to most people they are problems – like the phone home problem. You don’t encounter them until well into building a system. Enjoy the […]
So the the Decentralized Identity Foundation has an “identity challenge” with a project pretending to be it – with a very similar domain name and trying to do a token sale. I have a theory that almost all legitimate projects with real people and real work going on behind them also have fake projects shadowing […]
This is going to be the first in what will end up being a long and ongoing series of posts that deconstruct various “blockchain and identity” projects. I was inspired to get started after getting a min into the video explaining this identity system and at least thinking ‘screaming’ in my head NO! NO! NO! […]
I decided to open a thread On Twitter for ID & security professionals to share why (/if) putting hashed PII on any immutable ledger(blockchain) is a bad Idea. Not everyone agreed that it was bad if certain things were done right. There were 15 direct responses and then a whole lot of subthreads. I have pulled […]
Here is me on a the Creative Futurism podcast talking about Self-Sovereign Identity. We don’t go into the technology details but stay with the big picture concepts. What is happening is we finally have the pieces coming together for an identity layer of the internet where people are in control of their own identities. This […]
Tim Bouma wrote a post about Trusted Digital Identity. In it he unpacks several terms including this one Identifier: Anything (name, numbers, symbols, etc.) that uniquely distinguishes a member of a population from another member. I don’t think this definition gets at the complexity of all the things that can be identifiers and how to […]
Tim Bouma wrote a post about Trusted Digital Identity. In it he unpacks several terms including this one Identifier: Anything (name, numbers, symbols, etc.) that uniquely distinguishes a member of a population from another member. Part of Tim’s definition resonates with a conversation I had with Jean Russel in 2009 that I thought I would […]
I’m just putting it out here on this blog that I talked the data raindrop and how it works at IIW in the session about Sidewalk Labs. If Google try to patent it… yeah I was the one who had the idea. 🙂 I look forward to developing it with developers who think its […]
I worked with the Editor of Transformation Michael Edwards on a new piece Humanizing Technology that covers all three of my technological expertise and how they weave together. Social Emotional and Technical Technologies <–read the piece if it sounds intriguing.
The Many Bills of Rights This was originally published 1 August 2011 The second recommendation of the World Economic Forum report Personal Data: The Emergence of a New Asset Class after innovation around User-Centricity and Trust is the definition of global principles for using and sharing personal data. The The Startup Circle of PDEC is […]
I’m leading a session at the Cloud Identity Summit Thursday June 22, 2017 3:45 PM – 4:35 PM Chicago Ballroom VIII Unsolved Enterprise Identity Challenges Are you a CTO or CISSO with critical identity management, access control, or data privacy challenges? Then this is your session! In this interactive session, you will share and hear […]