An artist in Germany makes fake Facebook ID cards using information publically available on #FB.  I can see where Facebook would see this as an intellectual property infringement and they were nice about it, but, wait! It’s our data!  Or is it?

There were several other items of interest to the identity community (click more for the list and links):


  • Firefox Plug-in Reveals The Small Army Stalking You On The Web
    “This real-time visualization reveals that you're basically leading a parade of spice through the Internet”
  • Drummond’s Ten for Trust – Round One
    “To help explain what a Trust Anchor vouch really means, Connect.Me is inviting the first Trust Anchors (667 at this count) to do a Ten for Trust post: a list of the first ten (or more) people that we are giving a Trust Anchor vouch to, and why.”
  • Binary Blogger: Social Networks As The Identity Store?
    “It is important that if the IT security world is moving toward the universal identity, someone, somewhere needs to have control around how that's done.”
  • Boeing eyes authorization standard to harden access to intellectual property
    “Aerospace giant Boeing is testing emerging authorization technology as part of a first-ever plan to deploy standardized policy and attribute-based access controls to protect intellectual property it shares with partners and customers. At this week’s RSA Conference, the company is talking about its work with the Extensible Access Control Markup Language (XACML) 3.0 and an extension called the Intellectual Property Control (IPC) profile.”
  • Verizon: External Security Threats Skyrocketed in 2011
    “Verizon also previewed this bit of data: Some 29% of threat incidents involved the ability to guess a user's password correctly. In the wake of Windows 8 tying together a variety of cloud services under an arguably guessable, single Microsoft Account password, I asked Baker whether this percentage was likely to go up in 2012.”
  • RSA: Your Next Car Might Just Steal Itself
    “"Your next car might just steal itself." That was the tag line that convinced me to meet with Covisint at the 2012 RSA Conference. Covisint's Chief Security Officer Dave Miller filled me in on how a connected car might be hacked, and how Covisint works to prevent such a hack.”
  • Enterprise Facebook Use Wanes, At Least According to Zscaler
    “The report analyzes billions of Web transactions over Q4 2011. In particular, Facebook, Blackberry and Internet Explorer continue to decline in terms of enterprise traffic seen last year.”
  • Welcome to Project Moonshot
    “Project Moonshot is a Janet-led initiative, in partnership with the GÉANT project and others, to develop a single unifying technology for extending the benefits of federated identity to a broad range of non-Web services, including Cloud infrastructures, High Performance Computing & Grid infrastructures and other commonly deployed services including mail, file store, remote access and instant messaging.”




  • The API Facade: Overview
    “Thanks to all who attended the first episode in the Webinar Shorts series on the API Facade pattern. The first episode is an overview of the idea and theory of API facades. Here are the video (20 min.) and slides. Thanks @landlessness”

Cloud Computing

  • Authentication options for mobile native email apps
    “Inspired by a customer conversation, and mindful that (most but sadly not all of) my Ping colleagues take great enjoyment from my taxonomizing, I describe here the different permutations by which an enterprise employee can be authenticated when using a native mobile application client of a SaaS email provider (instead of a browser interface).”
  • Dell: Key to SMB cloud adoption is finding the right vendor
    “CRM, in particular, is the most popular of any cloud application at up to 55 percent, an increase of up to 34 percent from 2010. Many of the SMB participants cited single sign-on, automated feature and functionality upgrades, faster deployment, a lower total cost of ownership, and simplified access from a browser as some of the expected benefits of moving to cloud-based applications.”
  • Boston’s future jobs may be in cloud
    “The rise of cloud computing services - running software and storing files online, rather than on a computer hard drive - is expected to create 20,000 jobs in the Boston area by 2015, according to a report produced for Microsoft Corp. by Framingham research firm IDC Corp.”

Valuable Identity

  • Smart Card Alliance councils release PIV-I educational resources
    “The Smart Card Alliance Identity Council and Access Control Council have released educational resources to help individuals and organizations learn more about PIV, PIV-I and CIV credentials. For a general overview of the three credentials, the alliance published a brief that compares the three types in terms of policies, processes and technical features.”


* Required Fields