Well, here we go again.
The big companies love to embrace data portability and the freedom it provides its users, not to mention the press and goodwill that comes with it, as long as it doesn’t conflict with their corporate agenda.
Let’s call it what it is: Facebook and Google both support “convenient” data . . . → Read More: Data Portability Wars : Google and Facebook vs. YOU
At last week’s Internet Identity Workshop in Mountain View, California, I led a brainstorming session to identify risks to the success of the new National Strategy for Trusted Identities in Cyberspace (NSTIC, pronounced “EN-stick”). The strategy is to encourage many non-government organizations to provide digital identity and personal data services in a way that meets the needs of individuals, identity providers and those who rely on digital identity. What could go wrong with a project like this? What can be done to avoid these threats and risks? To mitigate them when they show up? Meeting notes…
Continue reading IIW12: An NSTIC Project Risk Analysis
We took a stab at rewriting the ten Portability Policy questions as user demands, behavior we want.
The list so far.
Document your APIs and data formats. Support existing identities. Support referencing to authoritative data in a location of my choosing. (include by reference) Support auto-updating from authoritative data in a . . . → Read More: Tuesday’s DataPortability session at IIW12
Dial or Skype details for this Wednesday’s Conference Call to start before IIW.
Here’s how you can bring the ideas in our data portability policy to hundreds of millions of people. I’ll need your help in May and June to start. In short: build portability principles into boilerplate identity contracts.
What’s a trust framework? . . . → Read More: #portability4trust: How we will bring data portability to trust frameworks this quarter.
* How are social networking sites and social media tools applying user-centric identity? * What are the open standards to make it work? (identity and semantic) * What are technical implementations of those standards? * How do different standards and technical implementations interoperate? * What are the new social norms and legal constructs needed . . . → Read More: Upcoming Event: Internet Identity Workshop 10