Here are the relevant links from my talk on Identity at Net Squared.
US, Our Organizations and The Web: Leveraging Identity Tools for Collaboration
Why is user-centric Digital Identity Important?
Augmented Social Network: Building Identity and Trust into the Next Generation Internet 2003, Ken Jordan, Jan Hauser, Steven Foster.
OpenID
OpenID
Data Linking
Standards
XRI Wikipedia at OASIS
XDI Wikipedia at OASIS
Companies
Strong Eye
Kintera & XDI
GoLightly
ooTao
i-cards
Identity Blog – Kim Cameron MSFT Identity Architect
Higgins Project at Eclipse
OSIS – Open Source Identity Systems (interop work with over 50 companies and projects)
Vendor Relationship Management
Project VRM at the Berkman Center, Harvard
Collaboration Community for the Evolving Identity and Relationship Layer
Identity Commons
EVENTS I INVITE YOU TO
Vendor Relationship Management Workshop
July 10-12, Boston
Internet Identity Workshop #7
November 10-12, Mountain View
Data Sharing Summit #3
September?
BONUS RESOURCES
Identity Community Foundational Resources
Laws of Identity
OECD Paper: At the Crossroads: Personhood and Digital Identity in the Information Society
Additional White Papers of Interest
Accountable Net: Peer Production of Internet Governance
Appropriating Technology for Social Change
Movement as Network
Network Centric Advocacy 2003
Simple Open Standards you can adopt now
OAuth
Microformats
XRDS – Simple
Open Social
Identity Rights
Identity Commons Q1 2008 Report. DONE!
I am excited that our second set of “official” quarterly reports as been wrangled, compelled, edited and published on the IC blog and in PDF format. If you are wondering what all is happening in the communities work on user-centric identity technology this is the one thing to read and the best part is it is updated very three months. We welcome new groups joining the community – it is a simple process.
We are a community of groups working on addressing the social, legal and technical issues that arise with the emerging, identity, data and social layer of the internet.
Highlights from Q1 2008 Reports
The 6th Internet Identity Workshopis coming up May 12-14, immediately followed by a Data Sharing Summit.
The OpenID Foundation had 5 corporate members join the board – Google, Verisign, Microsoft, Yahoo and IBM. OpenID Japan was founded and guidelines for local chapters are being developed.
OSIS Open Source Identity Systems is working towards the completion of its third major Interop event (at RSA and the European Identity Conference) with 57 projects participating.
XRI 2.0 will be going to a vote within OASIS shortly.
Higgins 1.0 was released on Feb 21st.
Project VRMis leading a 1.5 day workshop at the European Identity Conference and has an active London Chapter. Work continues on the initial text case Personal Address Management
New Groups of Note:
Enterprise Positioning is a community of people inside enterprises who need to understand and explain the application of user-centric identity in that context. page 10
IC Evangelism and Marketing began to help develop clearer messaging for Identity Commons and develop a values statement. page 8
Newbies 4 Newbies have given invaluable feedback on the language used to articulate user-centric identity, helping to improve the Internet Identity Workshop announcement significantly. If you are new to User-Centric Digtial Identity – wondering what they heck is all this stuff – what do these acronyms mean – this is the group for you. page 10
The Photo Group started with three groups on Flickr 1) Identerati Portraits, 2) The Art of Identity and 3) Member Gallery with the photos they have taken. page 11
The Quiet Groups:
IC Collaborative Tools
XDI Commons
Identity Schema
Identity Rights Agreements
Identity Futures
IdMedia Review
PDF of Report
Identity Commons Explainitory Diagram
I worked on this diagram of Identity Commons for a few hours last night. I hope it does a good job of getting across our loose distributed yet connected nature. Please let me know if you have ideas to improve it.
Someone already mentioned that “standards” is perhaps a challenging word – maybe it should be changed to “protocols”. Lets be clear IC is NOT a standards body never intended to be – goal help connect efforts together in a loose non-controling way that facilitates collaboration.
The Creepy Data
So Auren Hoffman e-mailed me regarding a blog post he just did about men and women and social networking. This subsequently pointed to his ‘research data’ which he does not disclose the way it was acquired.
There are three names for this company (more details can be seen in this post). One of them UpScoop gets users to enter their user-name and passwords for all their social networks – then “upscoops” the contact information of their friends and ‘scrapes’ all data it can see by logging in as those users. It then creates a database keyed to e-mail addresses for those users. This is an “opt-out” system – everyone is in it until they opt out – basically the ‘credit rating’ like system for social networks.
Then what happens is campaigns and social movement sites are approached by Trust Fuse to run the e-mail addresses they gather from supporters or those who want more information against their giant data base of e-mail addresses and it returns information about the person – their ‘real name’ their ‘age’ their ‘profession’ or what other information they are collecting (they make a point of NOT collecting sexual orientation information – this makes me feel soooo much safer about this ‘opt-out’ system).
I have had a conversation with leaders of a major social movement building organization and they have been approached by RapLeaf/UpScoop/TrustFuse to pay to run their e-mail addresses through their API.
I don’t think this model is respectful of human dignity in the online world.
I hope that Auren and people from his company can make it to both the Data Sharing Workshop and Summit & the Internet Identity Workshop.
On OpenID Progress: Part of a Bigger Challenge of Identity on the Web
TechCrunch just did a post about OpenID asked if it was being exploited by the large internet players that are participating in the community and adopting it.
I recall the first Internet Identity Workshop when the small crowd of ‘light weight’ ‘open’ ‘distributed’ SSO efforts came together and started their conversation about how they shared goals and very similar technology ideas – it was just the little guys.
Some context for those of you who don’t know this event was and continues to be co-convened and produced by myself, Doc Searls and Phil Windley – we are having our 6th stand alone workshop May 12-14 we also have also done 4 co-produced Identity Open Space events with Digital Identity World and Liberty Alliance near events that have had. This series of events that have no pre-set agenda in the past 2.5 years have been instrumental in moving the whole range of technologies forward because it creates “opportunities for both innovators and competitors, for the big guy and the small fry to come together in a safe and balanced space.” The Data Sharing Workshop and 2nd Summit – being done in collaboration with the more recently emergent DataPortability.org are building on both
* the track record of the IIW in bringing together high level people in a range of companies trying to tackle the difficult problems that need to be solved to make the vision a reality and
* the technology (standards and code) that are being brought forward via the Identity Commons community.
They agreed to Yadis a common service discovery method that would help their slightly different approaches work behind the scenes and then decided that Yadis as not such a good brand name and that is should be folded in and called OpenID.
These little guys had big hopes that OpenID would get adoption by large companies. It has been truly amazing to watch over the past two years as this collaboration that was cultivated by a community conversation has continued over the course of the Internet Identity Workshops – we are having our 6th one this May.
This space has been a neutral haven for all to express their views opinions and interest in different technological approaches. The Data Sharing Workshop and Summit build on this successful tradition and stack of technologies – it is the space where those inspired by the vision of data portability can get down into the details and make it real. Back to the TechCruch post:
The problem, though, is that the Big Four Internet companies that I mentioned above have made big press announcements about their support for OpenID, but haven’t done enough to actually implement it.
I agree with this statement AND there is some deeper issues that have yet to be addressed by the protocol itself to enable large sites to ‘trust’ (in the technical sense that the protocol flow will do what is says and can not be attacked) it. OpenID can be attacked from all sides (blackHat paper PDF outlining them). Bob Blakley from the Burton Group articulates the issues well here. David Recordon responded to a long critique of Stefan’s about the protocol. I think there is the potential to solve these issues but just ‘targeting’ the big players without addressing the real technical and social issues that are inhibiting large scale adoption is not fair.
Chris Mesina puts forward an in depth post articulating a shitlist, hitlist and wishlist around OpenID along with an update.
Great list highlighting things but it does not get to the heart of what in-the-end are the issues both technological and social that could limit adoption as ‘the’ solution to all that is needed for a people empowering identity layer of the web.
I look at all the progress happening in the Identity Commons community (here is our previous quarter’s reports) and have hope that solutions will emerge to address these challenges an “identity meta system” to work
* making it safe for users by making phishing really easy to prevent (this is where the card selector tools come in – CardSpace (MSFT) and the Higgins Open Source Card Selector (IBM, Parity, Novell-Bandit Project) Pamela Project relying party code)
* supporting selective and progressive disclosure (is done in a user friendly/repeatable way with cards)
* finding equitable legal frameworks and agreements for personal information sharing (Identity Rights Agreements Group is working on this and a gathering is being organized for this summer to address their development – many hundreds of thousands of legal work is needed to make this real)
* supporting automatic syncing and updating of information (this is where XRI/XDI and the Higgins Framework comes in)
* having third parties that mediate between end-users, their information and the market. (Yet to emerge businesses with new trust and business models – Project VRM is working on some of this).
OpenID is one part of a cluster of solutions – it will not solve these problems by itself (no matter how strong ‘they community’ or ‘the grassroots pressure’ because it is not sophisticated enough a protocol to do so. Those serious about really having these challenges address are invited to participate in the community and those who want to report on progress around an identity layer of the web need to look beyond ‘just OpenID’ and explore other proposed and emerging solutions that will together create an identity layer for web.
One great place to do this is at the upcoming OSIS (Open Source Identity Systems) Interop Event happening at RSA.
If you are reading this – you are interested but it is all making your head spin we have a Newbies 4 Newbies group that you can join and get peer-to-peer support from others engaging with this material (all or parts of it) for the first time.
Newbies 4 Newbies Call Tomorrow
If user-centric identity, the identity meta-system, identity commons and all this stuff is confusing.
You are wading through all this content on these blogs and wikis and going “AHHH! I just want someone to explain it.”
Well we have the group for you!
Newbies 4 Newbies formed not to be “experts” explaining it to new folks but instead to support new people sharing with each other resources that they found helpful and to challenge the ‘older’ members of the community to better explain things.
The group has a mailing list and is having its 2nd conference call tomorrow 🙂 Newbies are welcome 🙂 Click on their wiki page for details – call number to be posted shortly both there and on the mailing list.
Keen attacks the "identity dog's" right to exist.
In my home town paper the headline was Disconnect 1st Amendment from Internet hatemongers. The LA times version was Douse the Online Flamers: Faceless Internet sadists who ruin reputations don’t deserve full free-speech protection. Written by Andrew Keen the Cult of the Amateur guy – who wrote the book to get attention and blogs himself .
It begins with our little friend the “identity dog“.
THE CARTOON isn’t as amusing as it once was. “On the Internet, nobody knows you’re a dog,” one Web-surfing canine barked to another in that 1993 classic from the New Yorker. Back then, of course, at the innocent dawn of the Internet Age, the idea that we might all be anonymous on the Web promised infinite intellectual freedom. Unfortunately, however, that promise hasn’t been realized. Today, too many anonymous Internet users are posting hateful content about their neighbors, classmates and co-workers; today, online media is an increasingly shadowy, vertiginous environment in which it is becoming harder and harder to know other people’s real identities.
It goes into depth about several cases where anonymous online speech was harmful to people online.
And ends with him too..
All three of these cases indicate that the U.S. Supreme Court soon might need to rethink the civic value of anonymous speech in the digital age. Today, when cowardly anonymity is souring Internet discourse, it really is hard to understand how anonymous speech is vital to a free society. That New Yorker cartoon remains true: On the Internet, nobody knows you’re a dog. But it is the responsibility of all of us — parents, citizens and lawmakers — to ensure that contemporary Web users don’t behave like antisocial canines. And one way to achieve this is by introducing more legislation to punish anonymous sadists whose online lies are intended to wreck the reputations and mental health of innocent Americans.
I just finished reading Daniel Solove the Future of Reputation.
It goes in to great detail about the different forms that violations of privacy and reputation can happen and what the law has had to say about it.
One of the most important things to remember is that Virtue of Anonymity this is covered on page 139 of the chapter on Free Speech, Anonymity and Accountability (PDF).
The saga ofArticle III Groupie demonstrates how easy it seems to be anonymous on the Internet. A person can readily create a blog under a pseudonym or can post anonymous comments to blogs or online discussion groups. According to a survey, percent ofbloggers use pseudonyms rather than their real identities. Anonymity can be essential to free speech. As the Supreme Court has noted: “Anonymous pamphlets, leaflets, brochures and even books have played an important role in the progress ofmankind. Persecuted groups and sects from time to time throughout history have been able to criticize oppressive practices and laws either anonymously or not at all.”60 Anonymous speech has a long history as an important mode of expression.
Between 1789 and 1809, six presidents, fifteen cabinet members, twenty senators, and thirty-four congressmen published anonymous political writings orused pen names. It was common for letters to the editor in local newspapers to be anonymous. Ben Franklin used more than forty pen names during his life. Mark Twain, O. Henry, Voltaire, George Sand, and George Eliot were all pseudonymous authors. Indeed, James Madison, Alexander Hamilton, and John Jay published the Federal Papers under the pseudonym Publius. Their opponents, the Anti-Federalists, also used pseudonyms.62
Anonymity allows people to be more experimental and eccentric without risking damage to their reputations.63Anonymity can be essential to the presentation ofideas, for it can strip away reader biases and prejudices and add mystique to a text. People might desire to be anonymous because they fear social ostracism or being fired from their jobs. Without anonymity, some people might not be willing to express controversial ideas. Anonymity thus can be critical to preserving people’s right to speak freely.
He goes on to talk about the problems that non-accountable anonymous speech can create.
One page 148 he gets to Balancing Anonymity and Accountability. It covers “John Doe” Law suits and the Issues around Section 230 immunity – that ISP’s and other hosters like Yahoo! or even me on my blog are not responsible for what others say in online spaces we provide. The and cases that Keen points to are the result of the failing to find a way to apply Section 230 immunity well.
Solove proposes asks “What Should the Law Do?”
Although existing law lacks nimble ways to resolve disputes about speech and privacy on the Internet, completely immunizing operators of websites works as a sledgehammer. It creates the wrong incentive, providing a broad immunity that can foster irresponsibility. Bloggers should have some responsibilities to others, and Section 230 is telling them that they do not. There are certainly problems with existing tort law. Lawsuits are costly to litigate, and being sued can saddle a blogger with massive expenses. Bloggers often don’t have deep pockets, and therefore it might be difficult for plaintiffs to find lawyers willing to take their cases. Lawsuits can take years to resolve. People seeking to protect their privacy must risk further publicity in bringing suit.
These are certainly serious problems, but the solution shouldn’t be to insulate bloggers from the law. Unfortunately, courts are interpreting Section 230 so broadly as to provide too much immunity, eliminating the incentive to foster a balance between speech and privacy. The way courts are using Section 230 exalts free speech to the detriment ofprivacy and reputation. As a result, a host ofwebsites have arisen that encourage others to post gossip and rumors as well as to engage in online shaming. These websites thrive under Section 230’s broad immunity.
The solution is to create a system for ensuring that people speak responsibly without the law’s cumbersome costs. The task ofdevising such a solution is a difficult one, but giving up on the law is not the answer. Blogging has given amateurs an unprecedented amount ofmedia power, and although we should encourage blogging, we shouldn’t scuttle our privacy and defamation laws in the process.
He concludes
FREEDOM ON BOTH SIDES OF THE SCALE
Words can wound. They can destroy a person’s reputation, and in the process distort that person’s very identity. Nevertheless, we staunchly protect expression even when it can cause great damage because free speech is essential to our autonomy and to a democratic society. But protecting privacy and reputation is also necessary for autonomy and democracy. There is no easy solution to how to balance free speech with privacy and reputation. This balance isn’t like the typical balance ofcivil liberties against the need for order and social control. Instead, it is a balance with liberty on both sides ofthe scale—freedom to speak and express oneselfpitted against freedom to ensure that our reputations aren’t destroyed or our privacy isn’t invaded.
As I have tried to demonstrate in this chapter, a delicate balance can be reached, but it is not an easy feat. In many instances, free speech and privacy can both be preserved by shielding the identities ofprivate individuals involved in particular stories. With the Internet, a key issue for the law is who should be responsible for harmful speech when it appears on a website or blog. Much speech online can be posted by anybody who wants to comment to a blog post or speak in an online discussion forum. Commentators can cloak themselves in anonymity and readily spread information on popular blogs and websites. The law currently takes a broadly pro–free speech stance on online expression. As a result, it fails to create any incentive for operators ofwebsites to exercise responsibility with regard to the comments ofvisitors.
Balancing free speech with privacy and reputation is a complicated and delicate task. Too much weight on either side ofthe scale will have detrimental consequences. The law still has a distance to go toward establishing a good balance.
Andrew Keen is an ‘attention seeker’ (I had a ruder phrase in here but thought better then to publish it)- he is writing to be provocative, get attention and called upon to play the role of the ‘other side’ in a community that is experimenting with a range of forms of openness that challenge traditional or entrenched ‘expertise, authority and hierarchy’. Those threatened by emergence of power via new technologies ‘like’ what Andrew has to say. I think it is irresponsible for Andrew to call to the end of the First Amendment’s protection of Anonymous speech online because some small percentage of people are hurt by this – clearly there needs be some evolution in the law and the practices that we have to balance privacy and freedom.
What the Heck is Identity Commons?
The purpose of Identity Commons is:
The purpose of Identity Commons is to support, facilitate, and promote the creation of an open identity layer for the Internet — one that maximizes control, convenience, and privacy for the individual while encouraging the development of healthy, interoperable communities.
This one sentence jams a lot into it – we tried to do that so the purpose didn’t go on and on – but was clear, broad and inclusive of the range of issues that need to be addressed and balanced. Jamming so much into that one sentence also creates a challenge – it has to be ‘parsed’ quite a bit to get what it all means. I worked with Chris Allen recently to separate out the values within the purpose and our community. This is our initial draft that is still evolving (wordsimthing suggestions are welcome).
We believe in the dignity of human individual in the context of the digital world.
In order to make this true we strive for a balance of factors and valuesas digital systems and tools evolve:
- Individual control, convenience & privacy
- Sharing of information when participating in community
- Support for commercial and non-commercial exchange
- Interoperability and openness between systems
We work to bring these values into practice by fostering a collaborative a community of individuals, organizations and companies share these values and are working together towards practical technical implementations.
We share a pragmatic idealism.
We work to practice what we preach and have openness and transparency in what we do.
We do know there are a lot of technical social and legal issues that arise and Identity Commons is a space that make it possible to in a non-directive non-hierachical way address them in a collaborative way.
We also have some shared principles mostly concerning how we organize ourselves and work together. Each has a sentence to articulate it further.
1. Self-organization
2. Transparency
3. Inclusion
4. Empowerment
5. Collaboration
6. Openness
7. Dogfooding
What the heck is an “open identity layer” – well we don’t exactly know but we do have a community that has come together some shared understanding and continue to ‘struggle’ with what it means and how it should work. Identity Commons provides a ‘common’ space to work on this shared goal by facilitating dialogue and collaboration.
Kim Cameron introduced the terminology “identity meta-system” and articulated what that might mean. The Laws of Identity were put forward by him along with some additional ideas by other community members.
There is no “decider” or group of deciders or “oversight committee” as part of Identity Commons ‘directing’ the development of the “open identity layer”.
We are a community collaborating together and working to exchange information about our independent but related efforts working towards the vision. The way we do this is via the working group agreement.
- Asking each working group to articulate its purpose, principles and practices by filling out a charter – this helps us be clear about how different groups work and what they do/are planning on doing
- Stewards review proposed working group charters – ask questions, consider were there are synergies, and see if they are aligned with the purpose and principles
- A vote of the stewards council is held
- Working Groups agree to report quarterly on their activities to remain active as groups of the organization – this also is our core ‘inter group communication mechanism – so that you don’t have to be on 20+ mailing lists to know what is going on in the community.
More about Stewards:
Each working group has one steward and an alternate for the stewards council.
The stewards are responsible for the things IC holds in common – the brand and its integrity and common assets (like the wiki and bank account). It does not ‘direct things’.
Stewards have (an optional) monthly phone calls and discuss and make decisions on a mailing list (that anyone can join).
More about Working Groups:
There are working groups within Identity Commons that support the community collaborating – the stewards council does not ‘run’ these groups but they serve the community and our efforts together- The Internet Identity Workshop, IC Collaborative Tools, Idnetity Futures, Id Media Review, Identity Gang, Marketing and Evangelism.
Working Groups come in several forms:
They can be an group of people with a passion to address something they feel needs to be addressed to get to the big vision. They want some wiki space and a mailing list to talk about the issues. Examples include Enterprise Positioning, Inclusive Initiatives, Identity Rights Agreements.
They can be an existing project that are part of a larger organization, Higgins is an example of this – they are a project of the Eclipse Foundation.
They can be something that grew out of conversations in the Identity Commons community and found a home within another organization like Project VRM (charter) has as part of the Berkman Center and will likely become its own ‘organization’ independent of Berkman by the end of the year.
They can be completely independent nonprofit organizations with their own boards, governance, bank account etc. examples include XDI.org and OpenID.
Some just get technical stuff done as part of IC like OSIS (doing its 3rd Interop at RSA in a month), and Identity Schemas.
Benefits to being explicitly a part of the IC Community.
clarity about each groups purpose, principles, and practices – so that collaboration is easier.
sharing of information via the collaborative tools and lists, along with the required quarterly reporting,
We “don’t know” what an identity layer looks like but we do know it needs to have certain properties to make it work for people the extensible nature of IC gives people the freedom to start a new group that addresses an aspect of the vision. This is the page on the IC wiki that explains our organizational structure.
We are a community.
We are a community more then “an organization” and joining does not mean subsuming a group identity under IC but rather stating a commitment to a shared vision, common values and commitment to collaboration.
A touch of formalism can help create great clarity of group pratices (governenace), leadership, intention, and focus. Not needed for small groups of 12 people doing one thing- helpful when you scale to the 1000’s of people working on the big vision. IC through its groups structure has 1000’s of people participating helping to innovate the technology and think about the social and legal implications.
We are not about “a solution” or “a blue print” there will be multiple operators and multiple standards – yes like the web there may one day be ‘standard’ that emerges just like TCP/IP did and HTML/HTTPS – however it is way to early to promote or be behind “one” thing, it is not to early to start collaborating and building shared meaning and understanding and interoperability between emerging efforts.
Identity problems in the digital realm are as much about technical issues as they are about the social implications and legal issues. Identity Commons explicitly makes space for the social and legal issues to be deal with in relationship to the technologies as it evolves.
In closing there is a background (shorter) and a history (longer) written about the community as it evolved.
IC and Data Portability
Here are some question asked in a recent conversation on the dataportability.org lists about IC along with my responses.
Maybe the Identity commons should be trying to set boundaries as being purely about identity?
An “open identity layer” that touches so much and there needs to be a “common space” to nash through the vastness of the problem – to deal with the technical, social and legal issues around people sharing their information in community and business contexts. We have this ultra extensible form and broad purpose to enable this to happen – there is “no committee in charge” no “one” or “company” or “group” is deciding what we “do” – we are a loose conglomeration that shares vision and values. Working independently but connectedly and commited to collaboration. It It is an ‘unconventional’ model that that is working to supposed and connect diverse conversations and technical efforts together.
Can we instead resolve that we promise to incorporate any decisions made by Identity commons as being part of our blueprint?
There are no “decisions made by Identity Commons” read our principles – we are a cluster of working groups that work independently.
Your blueprint (as a side note why there is still ‘one blueprint’ and not ‘blueprints’ plural at the very least or preferably ‘reference implementations’ in the plural form is still a mystery to me) will likely draw on tech stuff groups in IC have been working on for a while. Why not be a part of the ‘commons’ that they are a part of?
My perception of IDCommons is that it’s about Identity, and in your words, interoperable user-centric identity.
Most of the people who have been involved for the past several years got involved to help people have control of their ‘data’ – their identity the informatoin about them is part of what composes their identity. they didn’t get involved to ‘invent’ an identifier layer that didn’t “do” anything
I see DataPortability being about data sharing (in a technical sense)Identity is clearly a very important part of that but I don’t see much at all on IDCommons about data sharing. It’s as though DP has a wider scope of which IDCommons is a major part.
The exceptions to this view are
- Identity Schemas group
- Photo Group
- Data Sharing group
None of which seem to have much activity.
* OpenID has attribute exchange and Discovery in it – all about data sharing.
* Higgins & Bandit and the Pamela project ALL about infrastructure for card based tools that are all about data sharing for people.
* Project VRM all about how to create a new industry model to revolutionaize CRM and put individuals in charge of their data in radical new ways when relating to companies they do business with.
* I-brokers – their job is to stor data about people and have it be trusted.
* IRA – Identity Rights Agreements – all about how we create human understandable terms of service and norms in this area (it is a huge project and has interested folks but really needs a multi hundreds of thousands of dollars in legal work to ‘do it’).
* XRI and XDI two standards with roots in IC all about data sharing that can be applied to both peoples personal data and other forms of data that have nothing to do with people.
* OSIS is the Open Source Identity System and having its 3rd Interop event at RSA (The major security conference) in April with over 200 tests between relying parties, identity providers and (user-agents) card selectors. this group is ‘only’ a working group of IC (it does not have its own independent legal entity/or affiliation with another one as a project). People moving data around is what all this card stuff is about.
So. I am not sure where we have groups that are not in some way focused on this problem area.
DP is just the latest in a long line of initiatives that recognises the same underlying problem but none of the previous initiatives have captured mind share or really got traction.
Our goal is not to ‘capture [public] mind share’ (does the W3C, OASIS or IETF capture public mind share?) our goal is to facilitate the range of technical, social and legal initiatives that all need to happen to get and identity layer of the web – that shares people’s data in privacy protecing, conveninent and under their control. It is a huge problem – with many elements – having a loose community structure (with a slight bit of formalization) is actually working in some way to move this forward.
I think we’d be missing a lot if we scoped DP as a specialization of an “open identity layer”.
What do you think moving peoples personal information arournd – data portability is about. It is about building an ‘identity layer’ of the internet – for people and people’s DATA.
Chris has said a few times the scope of DP is to be narrow for now and focused on solving the data portability issue between mainstream social networks. This seems like something that fits into the purpose quite well.
Yes all data for all things needs to be moved around AND a good deal of data is created by people for people about people and the things the they do – hence the synergy.
Seems like semanitcs – when we wrote this purpose about two years ago this was the best we could do to describe this ‘vision’ it is VERY broad.
If DP wants to go beyond ‘people’ data that needs to move around GREAT – however much of that will be created by organizations and companies (that have identities).
Related Posts: What is Data Portability.org
What the Heck is Identity Commons?
What is Data Portability.org
I have like many working for years on different aspects of building an identity meta-system where users have control. have been listening to and in some cases contributing to the conversations at dataportability.org for a few months.
There seems to me to be two different but interrelated energetic focuses in the DP group
* one is evangeslistic and pushing a message out – out into the mainstreatm.
* the other is technical – around what tech to use, how to implement it, what ‘action to take’. (much of the activity around technical side of the identity stuff needed has been happening in the context of the Identity Commons community for several years)
* the policy group is relatively quite in DP (and at IC) this critical aspect is needed but there has yet to be a center of gravity around this in the world yet. When I look out on the landscape I see several nascent conversations and hope that those nascnet conversation leaders can be brought together – so a gravitational center that is collaborative between all the trains of thought can form and really get this to happen (it requires significant funding – brain power etc).
One of the community leaders said “the value of DataPortability is that it is a brand that can represent multiple communities.”
Another leader stated this “DP has a very specific goal. To research, document for mainstream consumption and evangelize best practices for DataPortability.”
It got me wondering about what DP’s brand “is”, if the primary focus “building a brand” and what will/does the brand mean and what does the organization do? The following are some crystalized ideas based on listening to and participating in the conversation. They are all very interesting possibilities.
* Does having the logo on your site mean something about how much control you give ‘users’/people the ability to move their data?
* Does it mean that ‘shared’ user data – the relationship that one user has with another or a record of a transaction that I did with a company – do both parties ‘own’ that information and have shared control over where it is ‘ported’ around?
* is it a public rallying call for ‘netizens’ to rally behind to demand that they have ‘data portability’ and with this large netizen organization go to ‘social network providers’ nd ‘demand’ that they install technology to make it easy?
* is it a ‘trade’ association of technology sites that agree to adopt open standards, do testing and hold each other accountable in getting this to happen?
* does it innovate the strong ‘business case’ for companies with large numbers of users (and those starting to grow the number of users) might actually spend development dollars that enable DP rather then ‘do it later’ after other key features are rolled out?
* is it a movement of advocates and net early adopters who want to create a buzz and “move” large social network providers to invest in the standards and technologies needed to support people being able to move their data?
* is it a place where the technical issues in making this vision a reality are figured out and the ‘answers’ (reference implementations) are promoted?
* Is it an ‘open brand’ that anyone can point to and ‘define’ for themselves and say they do it?
* Is it a brand like OSI (Open Source Initiative)that has an a process that defines what is and is not qualified ‘open source’ licence?
* Is it a brand that holds events to talk about the broad subject of Data Portabilty – (a vast problem – with many potential solutions)?
* Is it a “Movement” lead by a charismatic leader or group that has ‘followers’ (think Free Software as an example of this kind of movement)?
* is it an umbrella/coordinating space for different sector groups to find each other and collaborate on the shared by different problem space (health care, insurance, retail, nonprofit groups, airlines etc – etc) in an extensible way?
There is a related post about Identity Commons and DP
and What the Heck is Identity Commons?
Internet Identity Workshop May 12-14
The Internet Identity Workshop is coming up May 12-4 … this will be 6th event. Phil has an announcement up – where you can find the gif to post on your blog 🙂
If you want to sponsor please contact Phil.
If you would like to help with the design – figuring out what happens Monday and some other time sculpting contact me – we are going to have a call this week to discuss.
I am really excited about this event for a few reasons. Things are happening – in a major way
- Card Selector tools and technologies are being build and tested.
- Convergence is happening (U-prove being bought by MSFT)
- OpenID is becoming the new hot ‘buzz word’ according to my blogging friends and heard randomly in conversations in the valley by young ‘trying to start a company types’ to impress VC types.
- The social issues are percolating in new ways and ‘demand’ for the movement of personal data is gaining real traction (dataportability.org).
- The OECD paper was just published that I had read small parts of before many months ago.
- The Venn of Identity Paper written by Drummond and Eve is being published by the IEEE this month.
- the IDTrust event that recently happened – went well and included many projects that have a home at IIW – hopefully some new folks will attend from the activities.
- New people like Ryan are finding the problem of identity and learning about what is going on – and then explaining it.
- Working groups founded at IIW – namely Enterprise Positioning and Newbies 4 Newbies both have mailing lists (Newbies, IdPositioning) and are holding regular calls.
- The more vendor oriented day will happen on May 15th following IIW – it will be the 2nd Data Sharing Summit co-produced by Laurie Rae and I.
- New social features on the web create new social practices – twitter, pounce, personal action or news feeds.
- VRM is progressing and making presentations to ‘shift’ business logic.
History of Identity blog series
Two weeks ago when I was in NYC we had an identity gathering. It was one of those ‘open space’ kind of days – who ever comes are the right people turns out it was 4 of us Me, Ryan, Tony and Ken Jordan. The person who instigated the meeting Ryan Jenssen because he reached out and asked to help Identity Commons and I said why not have a meetup when I am in NYC.
He is now writing a whole series talking about A History of Tomorrow’s Interent on his Dr Star Cat blog so far it is great.
Identity Intro Part 1,
Identity Intro Part 2, Identity provider diagram
Identity Intro Part 3, This has a diagram that articulates the companies projects, products and people.
Identity XRI/XDI Part 1,
To be continued….
Identity Gang Meeting in NYC
I am headed to NYC to facilitate the Online Community Unconference East. While there I thought it would make sense to have a meetup about Identity Commons and all the stuff happening in the community.
Ryan Jenssen reached out to me this week about community developments and contributing. We chatted back and forth and he agreed to have the event at his offices – at Angel Soft. I think we should have drinks starting at 6:15 dinner at 7 and presentation(s) at 7:30 for 1/2 an hour then lots of mingling.
Identity Gang – Social for Identity Commons
Feb 19th at 6:15 – dinner at 7:00 $10 fee.
Please RSVP on Upcoming or e-mail me if you don’t want to do that.
Should be a great opportunity to meet other NYers involved in the community and ask all the questions you want about the community efforts, OpenID, Higgins, OSIS, Bandit, Pamela Project.
The "We" of Identity for "Our Web" (the Social Graph)
I originally wrote this for Web 2.0 Expo last year April 2007 – It was called Why Identity Matters for Web 2.0. It has not been published in HTML yet. I kept hoping to make it better to refine it more. I will do that but now is the time to put this out there in linkable form.
The “We” of Identity for “Our Web” (the Social Graph)
[Originally the Why Identity Matters for Web 2.0]
Web 2.0 is about the emergence of an alive web – made up of people connecting and sharing together in groups. It is literally pulsing with the thoughts, hopes, wishes, actions, poems, prose, photos, video’s and many cultural expressions of our lives. Our identities – who we are is socially constructed. We could start with the word ubuntu – it is not just the name of a user-friendly Linux distribution it is a zulu word that means “I am who I am because of who we are together.”
Doc Searls has put it another way – we are the authors of each other. We have had “identity” since the dawn of time – our identity is innately shaped by the culture we live in, the geography of place and the resources at hand. Through Web 2.0 tools we are just doing what has been done for millennia in communities where sharing stories shaped culture and gave us a sense of who we are – exchanging all sorts of value with each other – some of which were around material goods, and some of which were around services. And much of it was mutual authoring through the creation and sharing of culture, meaning and reputation. Who we are and who the individual was mattered enormously in the context of the “we”.
I recently heard a talk by David Weinberger where he talked about first, second and third order information storage related to books. I think this frame can be helpful for us to think about what is going on with identity for people and the web. In first order storage, books exist in one place on a book shelf. Second order storage is the card catalogue with the meta-data about the books on the book shelf. With digital media and the internet we have third order storage of books where the data (the book content) and the meta data (information about the book) are both virtual and can exist in more then one place at a time.
Although our bodies can only be in one place at a time a lot of what web 2.0 is about is the extension of ourselves into the digital realm. Some of us have personal pages on multiple social networks. We put information about ourselves online and share it in all kinds of places. We work together to filter and sort information for our communities. We play games with people from around the world. (70% of Second Life is from outside the US). We manage our Instant Messaging presence on multiple networks simultaneously! Who we are when we do all these things matters a lot because the bread crumbs we leave behind. The impressions we make on others – the way those people mark, tag or otherwise order our shared experience.
We are also seeing challenges in this new atom bit mix. In extending ourselves into the digital realm things happen to our identities that were not possible when all records about us were stored physically. This new fluidity can be a bit disconcerting and raises new privacy concerns. It is easy to ping a database and learn about all ones past transactions with a company – this could be good for self reflection and better deals but bad take it to use against us. We are sharing ourselves in new ways online –we can project pieces of ourselves through our blogs, we can show up in Flickr, and online video’s. We are all “a little famous” to others beyond what we could be in ‘just’ a physical world – where once you might have shown up in the local paper just once in your life for winning a science fair – (like I did when I was 12!) – now you show up daily to your friends but also to those who randomly discover you. The old model still has my science fair win locked up in the local paper in a microfiche in my home town library. The new model has me and anyone else distributed, searchable, browsable and discoverable across the globe.
The promise of Web 2.0 comes with the distributed web of information by and about me AND by us about us. With an identity layer there exists the potential for products and services to go beyond isolated silos to deeply link together people, events, associations, meaning and media to become more than the sum of what any application could do or be alone. Identifiers that work in the digital realm along with human friendly metaphors and user-interfaces to manage this including one’s own privacy are critical for a fully realized vision. These new identity tools to be trusted must protect privacy, reputation and be secure. These are the challenges that must be solved collaboratively by the larger web 2.0 community.
Web 2.0 is only going to work if people trust the web enough to use it. PHRAUD, Phishing, pharming and theft of identity, are destroying user trust and USER TRUST is critical for Web 2.0 to succeed. Kim Cameron, one of the leaders in the Identity community has been tracking fraud statistics and they are staggering. When the Internet was created it was a small community of scientists, hackers and academics who didn’t need an identity infrastructure, because they already had (out of band) in the context of their own smaller communities. Web 2.0 creates the opportunityfor us to ‘know’ each other again and reweave a fabric of trust on the web through communities. This is a hard problem well beyond the ability of any one person or one community to solve it. In the Identity Commons community some building blocks to solve these issues have emerged but we don’t know the answers.
The community has innovated OpenID as a way for individuals to sign-in to sites across the web that support the protocol. Looking ahead are conversations about:
- datasharing services so that I can update my information once and it “shows up” in multiple places or not as I desire.
- personal network portability where I can take/share/access ‘my’ network of contacts from one service to another.
- vendor relationship management services so I can manage my relationships with companies I buy from.
All of this is still individually centric and I think the real value opportunity is in communities – communities of people who know each other, care about each other and seek to collaborate together on activities none could really do alone. How do we – show up together in many places? The power of groups to work together and move themselves around from context to context coherently is nearly impossible. The real value is in the WE made of many I’s, because people fundamentally see themselves as part(s) of social groups. For web 2.0 this means having tools that support both people AND communities. Success in an interconnected social web means platforms and companies need to begin thinking about designing for “my architecture” this is in the context of our web, so they must also begin thinking about designing for “we architecture.” I (as a user) am going to use tools that work for me using my identity to hang my relationships on – hooks to me — if you will. Because I am a social being – I relate to many groups and share many imagined communities and cultures with others. This will unleash a reflective power this gives us as individuals and collectively the ability to make better decisions and act differently. It creates a feedback loop we didn’t have before.
Community is about shared meaning, understanding and trust to take action together. When you get down to it trust is crucial for a heart in Web 2.0. This raises the question of how and why do we trust? Is it because you hand me government papers that say you are who you say you are? When do we do that in real life? Only when we are interacting with abstract entities – ‘the bank’, ‘the government’, ‘the passport control check point.’ We generally don’t use these to interact with others socially.
Trust, in part, comes from knowledge of past interactions and basis a decision to trust in the present comes from a combination of current context and past interactions. These can be interactions with
- ourselves. I trust my friend Sally because we have been doing things together for a long time.
- others we know who vouch for their past experience. I trust Bill who is Sally’s friend because she trusts him.
- others we don’t know who assert successful past interactions. I don’t know Jane but she says Suzie was a good person to do business with.
Trust is not an algorithm it is a knowing set of instincts we evolved and intuition we develop to survive and thrive in social groups. Each of us individually and each of our communities (the we’s) have our own way of balancing our needs for trust as our lives and community dynamics that unfold moment to moment. We make decisions regarding trust based on a range information that we have which we mentally aggregate to form judgments as we need to.
The “how” of all this is not obvious – science is just starting to unpack the deeper roots of our minds and human social behavior around trust instincts and intuition. In our evolutionary past these were tribal groups of around 150 people that you knew for life. A question we must ask our selves is what if our natural ways of discerning about trust don’t scale to the size of our social context today whether it is cities of millions or a web of billions? Another question that arises is what happens when our assumptions for social behavior work in a shared culture be it epistemic, geographic or religious but not in another? How do we as an evolving web 2.0 culture develop enough cultural literacy, emotional maturity and helpful tools to overcome these hurdles?
We must think deeper then “5 star ratings” and gesture algorithms to look deeper human at drivers and social processes. Instead of thinking in terms of technology and platform we need to innovate solutions to these difficult problems that are user-centric. And solutions that are rooted in community contexts.
So what do we do today? Where do we start? I believe the place to begin is to start supporting OpenID to become a relying party and if possible an OpenID provider. OpenID gives users the freedom to extend themselves across the web in a way that is under THEIR control.
Next, before we can get to good answers, we need to determine good questions. I invite you to join the conversation at Identity Commons and the Internet Identity Workshop about how group identities along with individual identities should be supported in a living web, the new web for all of us – Web 2.0.
Web 2.0 provides us with a fabulous new set of engines that have made Wikipedia possible created live search and many others we learning about here. So the big question is what kind of new engines can Web 2.0 provide us to enhance IDENTITY and TRUST to form a distributed social fabric. What can YOU do with Web 2.0 to create a trustable social web? That’s my question to all of you building and participating in Web 2.0.
(if you want to comment please just e-mail me – long story my tech has not gotten OpenID working on this WordPress blog yet).
Identity and Presence: Speaking at Event Friday
I am speaking on Friday at the Value Networks Community Cluster about Identity. The theme is Presence 2.0: Rise of Living Networks.
I did not make up this Copy describing the even but here it is:
We are in the throes of a major revolution in collaboration, community, business, the environment, economics and civil society. Web 2.0 and Enterprise 2.0 are ushering in a new network era. A deep social reorientation of work and wealth creation is in play. Prosperity is achieved through deliberate pursuit of diverse relationships. It is positively critical to nourish and nurture your links and flow paths through periodic, same time, same place collaboration and periodic transorganizational collaboration. These key relationships are further developed and optimized through ecologies of living social networks. Today we have an enormous capabilities infrastructure for social network applications. Fact is, these innovations still depend, in large part, and on many levels, on well-developed personal relationships.
Enterprise 2.0 Presence and Identity: The Rise of Living Social Networks will examine rapidly expanding, hyper-connected social network services, programmable webs and socially-mediated, knowledge-based business activities. New device-based social networks, an IPv6 address space of 3.4×1038, geocoding, pervasive computing, collective intelligence networks and, above all, the importance of collaboration to everything, has fundamentally and permanently altered they way we learn, work, play and thrive. Living social networks are making an enormous impact to the environment, wealth and well-being. Specifically, living social networks are becoming critical to all business. They are the critical value paths essential to corporate performance, business excellence and civil societies. For example, live, real-time communications such as IM, VoIP and mobile are becoming far more emergent and social. Simultaneously, asynchronous social networks applications like blogs, wikis and email are becoming far more real time.
Here is who will be speaking:
- David Coleman will cover his newest book, Collaborate 2.0.
- Stuart Henshall will examine presence and enhanced knowledge path and flows.
- Phil Wolff will lead a discussion on the Enterprise 2.0 social stack.
- Kaliya Hamlin,The Identity Women, will furnish an important update on the identity.
- Verna Allee will review recently conclude mobile worker research using VNA.
- Ross Mayfield will further develop the vision of the social enterprise.
- Alex Lewis will cover Microsoft’s Presence strategy in OCS 2007.
- Don Steiny respected Stanford researcher in social network analysis.
If you want to come you can get a discount – 60% off.
Yeah don’t ask me about the price point – I already brought it up – apparently they ‘break even’. They even made me pay to talk. I like Verna a lot so I said yes.
Your identity on your Time. Your Employer cares.
This was on Slashdot today and in the NYTimes.
In the absence of strong protections for employees, poorly chosen words or even a single photograph posted online in one’s off-hours can have career-altering consequences. Stacy Snyder, 25, who was a senior at Millersville University in Millersville, Pa., offers an instructive example. Last year, she was dismissed from the student teaching program at a nearby high school and denied her teaching credential after the school staff came across her photograph on her MySpace profile. She filed a lawsuit in April this year in federal court in Philadelphia contending that her rights to free expression under the First Amendment had been violated. No trial date has been set.
DNA – Identity and communities for the genetically 'rare'
This came by Slashdot today from the NYTimes
Sometimes what they find is unsettling. But in the emerging communities of the genetically rare, more often it is sustaining.
For three families, the impulse to find others in the same situation was immediate.
A few months before the Lanes crossed the state to meet Taygen’s chromosomal cousin, Jennie Dopp, a mother in Utah, was scouring the Internet for families with “7q11.23,” the diagnosis that explained her son’s odd behavior and halting speech.
“I want someone to say ‘I know what you mean,’” Ms. Dopp told her husband, “and really mean it.”
Noa Ospenson’s parents flew from Boston to South Carolina for a meeting of 100 families with children who, like Noa, are also “22q13.” Hoping for more information about their daughter’s diagnosis, they emerged as lifetime members of what they call “Noa’s tribe.”
For each of them, a genetic mutation became the foundation for a new form of kinship.
Identity Direct "Personal E-mails from Santa"
I saw this add at the bottom of I Can Has Cheezburger – (for those of you who don’t know it is the ‘home’ of the LOL (Laugh Out Loud) Cats Genera of internet humor.)
So I clicked on it and found this
Now your child can write to Santa and receive a reply! Print out this personalized letter from Santa. Imagine the excitement when they read just how much Santa knows about them.
All you need to do is fill out the details below (the more information the better the letter) and we will instantly email you a letter from Santa. All you need to do is open the attachments and print using the best quality color you have available. The graphics are great and worthy of high quality color. To get the best results, For Present, please put a sentence to proceed the question “What could it be?” For example “A bike?” or “The doll house you love?”
Looking below the only fields that are required are your e-mail address your child’s name and your child’s birthday. I suspect this is so they can ping you before your child’s next birthday and remind you to buy something.
I just look and wonder at anyone who wants to know my birthday – and giving away my child’s birthday. Who knows where the information will go.
Diving into the site I find you can get books printed with your child playing a role in the story. Just in case your kids were not narcissistic enough already.
Online Community Interview about Identity
Last week I did an interview with Forum One Communications about Identity and OpenID. For those of you who don’t know about Forum one they are doing a lot of good work connecting online community managers and online community platform providers and companies who have online communities related to their business. They have the Online Community Research Network and publish the Online Community Report I helped facilitate the Online Community Unconference and recently attended the Online Community Summit.
I thought it was going to be a recorded interview – like a podcast. It was instead a sort of group live chat interview. The questions were good and build upon each other. You can see it here. I hope that some of the people actively involved in online community will come and participate in some of our activity addressing identity issues online.
What does 'federally approved secure licenses" mean?
My Husband Brian who forwards me articles from the mainstream press about identity sent me this article Feds Strike ID Deal Over NY Licenses
Saturday’s agreement with the Homeland Security Department will create a three-tier license system in New York. It is the largest state to sign on so far to the government’s post-Sept. 11 effort to make identification cards more secure.
Why Can’t they Here Us? Identification Cards don’t make us m ore secure. They infringe on our rights.
Article continued…
Under the compromise, New York will produce an “enhanced driver’s license” that will be as secure as a passport. It is intended for people who soon will need to meet such ID requirements, even for a short drive to Canada.
A second version of the license will meet new federal standards of the Real ID Act. That law is designed to make it much harder for illegal immigrants or would-be terrorists to obtain licenses.
A third type of license will be available to undocumented immigrants. Spitzer has said this ID will make the state more secure by bringing those people “out of the shadows” and into American society, and will lower auto insurance rates.
Incomplete Identity: Auren on Identity at Stanford Law
I was invited by Auren Hoffman (Rapleaf Reputation 3861) to see him talk at Stanford Law school this afternoon. So I Trecked all the way down there. I had high hopes given the description . . . …
Portable Identities and Social Web Bill of Rights
The future world of portable identities, reputations, and social graphs has many pluses and concerns. These portable systems could make the benefits of personalization, once only relegated to science fiction, a reality. The Social Web Bill of Rights makes the claim that users have the right to portability. But there are privacy implications to take into account as well. We will discuss an opt-out vs. and opt-in approach on data collection, privacy, and portability.
———
but I was disapointed. I first met with Auren in a Starbucks before Rapleaf was launching many years ago (in internet time). I had not seen him since despite inviting him to every Internet Identity Workshop since then.
When opening the talk the Stanford student gave the the description given of Auren’s goal with rapleaf was this “Enabling people to look up the online reputation of others. Making it profitable to be ethical.”
He opened articulating the basic components of the ‘ Social Media Users Bill of Rights‘
You Own:
- Your information (basic info about you -address height etc – and preferences)
- Your Social Graph
- Your Activity Stream
The key things for this to work control over who accesses it and the freedom to grant persistent access
He also had a slide that mentioned that it be verifiable (???) I was confused by this and was not sure where it was drawn from and was not further articulated. As a side note one of the things that Bob Blakely (currently of the Burton Group previously blogging here) talks about Privacy is “the ability to lie about yourself and get away with it”.
Ok back to Auren’s talk.
Portable (identity, reputation and social graph).
Why is this important – because of the Tyranny of wasted time ‘refilling all those forms out’.
Portability of identity (in the way he used it) was articulated as – it is just information about you that basically is self asserted.
Social Graph portability was just briefly referenced about ‘the people you are linked to’. There was no discussion of one of the main concerns – a ‘social link’ is between two people and moving that information from one context to another should have the consent of the party that a link is asserted about. Update:Having completed the post and understanding their data-aggregation model that fits into their business model they explicitly mush peoples social graphs together from different sites to create an aggregate social graph that as far as I can tell is not visible to the user. Distinguishing and keeping separate context is not what they do.
He asked rhetorically “What is your identity” and then mushed claims and preferences together as if they were all the same kind of identity information (where you live, what you buy, what movies you like, your sexual preference).
He talked about why several efforts in the past have failed. He said that Passport failed because it was an ‘opt-in’ system that very sites would integrate.
I thought this was an interesting assertion. I guess it was opt-in on the part of the relying parties – but the reason the didn’t opt-in was because there was only one Identity Provider and they didn’t want to be locked into only getting identities from them. Individuals had no choice but to get their identities from Microsoft to use the system. This whole reasoning was not articulated for the students though.
The failure of Passport he said proved the difficulty with the opt-in way.
The ‘reformed Microsoft’ vision of an identity meta system and particularly the Laws of Identity that inform the whole current conversation of portable identity were never mentioned.
Reputation he said was (sort of) context dependent. My internal reaction was “SORT OF? it is completely context dependent”.
He talked about Credit scores (opt out) as a white list and captchas that prove you are not a robot. I didn’t quite get what Captchas had to do with portable identity – it seemed to be a leap that was mad in his logic that was not articulated – if you have white lists (like credit scores) that prove you are a ‘real person’ then you don’t need captcha’s. At least that is what it seemed to me he was saying.
He said that Whuffie was a social currency from doing nice things articulated in Down and Out in the Magic Kingdom.
This part was nice the chart articulated the Benifits and Challenges of Opt-In and Opt-Out systems.
Opt-In | Opt-out | |
Benefits | User Decides | Critical Mass High Adoption Rate |
Challenges | Few Users No one wants to integrate |
Peoples Privacy |
He continued talking about the privacy implications of portability. He articulated that companies should show people all the data they collect about them. He raised the issue about cookies and how ‘freeked people out’ when first introduced but now are normal. He also said that technogrpahics and behavioral Ad networks should share data.
He said that more data collection is inevitable – but at least we can have control over this data. We are not going to stop them taking data about us. We should require to tell us what data collect about us.
He said that privacy is a Grey Area but not reference any of Solove’s work on the subject of identity and privacy, information systems and law.
He did not suggest any tools for doing this or how we would audit and check on their collection accuracy or honesty. Omitting these made it all seem the goals of the user-bill of rights were just dreams really far off. There was the
Datasharing Summit that spoke a lot about this – there is the Higgins framework (although in its infancy it has working demonstration code) that has some core tools to do this for people and the sites that have information.
At this point we had questions and I challenged – Auren on his assertion about the draw backs of Opt-In. I said that OpenID was challenging the argument that it could not be widely adopted. He said yes AND it was only available on a very small number of sites.
Questions about the ‘right to delete’ were raised by Lawrence Lessig. Apparently in Germany there are laws about publishing information about past criminal offenses of long ago. How these translate online is a good question.
Both during his talk and in the question and answer period he talked a lot about the potential for optical recognition to track us around in physical space. It was conflated with tracking us around the internet. These are two very different systemic processes that have some similarities but a lot of differences. They were conflated in his articulation of the subject.
Improving EULA’s was touched upon but no mention of Identity Rights Agreements work was mentioned – so I put if forward and invited those attending to come to the Internet Identity Workshop.
I will say it was nice to see Lauren Gelman. Last time I saw her was at Web 2.0 Expo speaking following my talk on Identity and Web 2.0 and she was very pregnant. Now she has a 4 month old.
At this point I didn’t really know what RapLeaf did – I was about to find out. I thought it was just a tool that people used to do reputation outside of e-Bay for buying and selling…not so. It got way creepier since I last had it articulated at Starbucks.
Joseph Smar drove me to the Stanford train station and he explained the RapLeaf business. Basically they go around the internet and collect information about people that is keyed to their e-mail address. They aggregate this information and then they know about you. They then sell this information to sites who want to know about their user base.
His system is Opt-Out. I am in it twice(Rapleaf score 5 and 4 respectively). This is how they claim to help you keep your privacy.
You know as a user I am forced to give ‘real’ e-mail addresses to get accounts on services. Two of the services listed in my profile I don’t use at all (Tribe and Hi5). I don’t even remember signing into Hi5. I know my social graph in Tribe, Flickr, LinkedIn and Facebook are different and not directly transferable between them. I don’t want to be connected to ‘everyone’ in all contexts.
Surfing around to learn more about them and the reaction in the blogosphere I found some interesting things.
Download squad:
When you hover over a Rapleaf attribute with the mouse pointer, Rapleaf will now show you where it got the information that makes up an element in your Rapleaf rating–whether it was gleaned from a social networking site such as MySpace or provided by a peer who claims to know you. Yeah, all these factors contribute to Rapleaf’s estimation of your reputation, and now you can tell where the info actually came from. Useful… especially if Rapleaf got some detail wrong about you!
There is quite a bit on this blog but just one highlightThe Bankwatch:
This smacks of blackmail to me. A while back I received an email from Rapleaf noting that someone had searched for my address. In that case I knew it was me searching myself, but why am I left feeling that they are snooping on me, despite the fact I think [?] they are trying to protect me.
Rapleaf.com, a people search engine that lets you retrieve the name, age and social-network affiliations of anyone, as long as you have his or her e-mail address; and Upscoop.com, a similar site to discover, en masse, which social networks to which the people in your contact list belong. To use Upscoop (proudly stating they have searched 400,000,000 profiles), you must first give the site the username and password of your e-mail account at Gmail, Hotmail, Yahoo or AOL.
By collecting these e-mail addresses, Rapleaf has already amassed a database of 50 million profiles, which might include a person’s age, birth date, physical address, alma mater, friends, favorite books and music, political affiliations, as well as how long that person has been online, which social networks he frequents, and what applications he’s downloaded.
All of this information could come in handy for Rapleaf’s third business, TrustFuse, which sells data (but not e-mail addresses) to marketers so they can better target customers, according to TrustFuse’s Web site. As of Friday afternoon, the sites of Rapleaf and Upscoop had no visible link to TrustFuse, but TrustFuse’s privacy policy mentions that the two companies are wholly owned subsidiaries of TrustFuse.
I suppose we should be happy to note that Rapleaf is not keeping track of our sexual orientation or the porn sites we visit.
They are using their information to help the political process though. (good thing I am Canadian and don’t participate in all that – not giving my e-mail address to political candidates).
From their website it articulates how you can ping their database of people to learn more about ‘your customers.’
Rapleaf’s TrustFuse product is an automated way of querying the Rapleaf system. Using Rapleaf or UpScoop is free and easy to use for consumers. If you are business, you can use Rapleaf’s TrustFuse system to learn about and serve millions of customers.
Work with Rapleaf by either:
1. Use our APIs to query your data real-time.
2. Upload the data in batch
Rapleaf’s TrustFuse product searches for information on your customers so you can provide them an enhanced user experience. You can use the API for up to 4,000 queries/day at no charge. After that, we charge a nominal amount per look-up.
So seems like campaigns are using TrustFuse from RapLeaf to figure out more about the voters that have signed up to get more information/participate in campaigns. I wonder exactly what they are finding out via the API’s.
Sigh.
His service is even more creepier then I imagined. It explains why he thinks that Opt-Out is the way to deal with these issues. Auren did say that if he couldn’t make it he would send someone to IIW in December. Hopefully we can have some fruitful face to face conversation.