Welcome to the Identity Woman Blog I am an advocate for the rights and dignity of our digital selves. Where I am in the World Latest Media & Papers Posts about Identity & NSTIC Organizations and Events I share leadership in Click more to see below the line and find out all this.
So the the Decentralized Identity Foundation has an “identity challenge” with a project pretending to be it – with a very similar domain name and trying to do a token sale. I have a theory that almost all legitimate projects with real people and real work going on behind them also have fake projects shadowing […]
This is going to be the first in what will end up being a long and ongoing series of posts that deconstruct various “blockchain and identity” projects. I was inspired to get started after getting a min into the video explaining this identity system and at least thinking ‘screaming’ in my head NO! NO! NO! […]
I decided to open a thread On Twitter for ID & security professionals to share why (/if) putting hashed PII on any immutable ledger(blockchain) is a bad Idea. Not everyone agreed that it was bad if certain things were done right. There were 15 direct responses and then a whole lot of subthreads. I have pulled […]
Here is me on a the Creative Futurism podcast talking about Self-Sovereign Identity. We don’t go into the technology details but stay with the big picture concepts. What is happening is we finally have the pieces coming together for an identity layer of the internet where people are in control of their own identities. This […]
Tim Bouma wrote a post about Trusted Digital Identity. In it he unpacks several terms including this one Identifier: Anything (name, numbers, symbols, etc.) that uniquely distinguishes a member of a population from another member. I don’t think this definition gets at the complexity of all the things that can be identifiers and how to […]
Tim Bouma wrote a post about Trusted Digital Identity. In it he unpacks several terms including this one Identifier: Anything (name, numbers, symbols, etc.) that uniquely distinguishes a member of a population from another member. Part of Tim’s definition resonates with a conversation I had with Jean Russel in 2009 that I thought I would […]
I’m just putting it out here on this blog that I talked the data raindrop and how it works at IIW in the session about Sidewalk Labs. If Google try to patent it… yeah I was the one who had the idea. 🙂 I look forward to developing it with developers who think its […]
I worked with the Editor of Transformation Michael Edwards on a new piece Humanizing Technology that covers all three of my technological expertise and how they weave together. Social Emotional and Technical Technologies <–read the piece if it sounds intriguing.
The Many Bills of Rights This was originally published 1 August 2011 The second recommendation of the World Economic Forum report Personal Data: The Emergence of a New Asset Class after innovation around User-Centricity and Trust is the definition of global principles for using and sharing personal data. The The Startup Circle of PDEC is […]
I’m leading a session at the Cloud Identity Summit Thursday June 22, 2017 3:45 PM – 4:35 PM Chicago Ballroom VIII Unsolved Enterprise Identity Challenges Are you a CTO or CISSO with critical identity management, access control, or data privacy challenges? Then this is your session! In this interactive session, you will share and hear […]
Two weeks ago the K(no)w Identity announced that Edward Snowden is going to be the keynote speaker. It will be interesting to hear what his take is on the state of the industry. I wonder if he actually doing to do research to understand the current dynamics. Looking out broadly into the industry landscape. I […]
So.. I’m watching this fine video by IBM about its “self-sovereign” identity document solution that magically the drivers licence authority can “erase” with a click of the button from them (yes the could if need to be able to revoke your privilege to drive but its an ID you use for many other things besides […]