Stephen Wilson, @Steve_Lockstep, lives in Oz. He is famous as an anti-federation curmudgeon (and has many good points). Here he reminds us that in some parts of the world (in this case, Australia), privacy is what the law says it is:

  • Stephen Wilson: Let's talk about privacy, in engineering terms
    "Online, we're talking about data privacy, or data protection, but systems designers tend to bring to work a spectrum of personal outlooks about privacy in the human sphere. Yet what matters is the precise wording of data privacy law, like Australia's Privacy Act. To illustrate the difference, here's the sort of experience I've had time and time again."

There were many more items of interest to the identerati:


  • John Fontana: Google's continuing odyssey to sink passwords
    "Google isn't just beginning to attack the password, in fact, it has been working since before 2010 on eliminating passwords and standardizing authentication on the Web."
  • OpenID Connect: works with OIDF members to transform the future of enterprise identity
    "The explosion of enterprise apps has made managing access and identity needlessly complex. Users are frustrated with juggling multiple log-ins, and enterprise IT is frustrated with managing secure access across all of these apps. is collaborating with other OpenID Foundation industry leaders to make OpenID Connect more viable for the modern enterprise, with its unique security needs, increasing numbers of connected apps and sprawling mobile device users."
  • Bruce Schneier: When It Comes to Security, We're Back to Feudalism
    "Today's internet feudalism, however, is ad hoc and one-sided. We give companies our data and trust them with our security, but we receive very few assurances of protection in return, and those companies have very few restrictions on what they can do."
  • John Fontana: Developers getting JSON-based options for enterprise authentication
    "Options for building enterprise authentication infrastructure are expanding as new RESTful service alternatives emerge to support identity and security needs, such as federation, digital signatures, encryption, security keys, and token exchange."
  • Janrain Joins OIX to Help Build the Open Identity Trust Framework
    ""As a founding member of the OpenID Foundation, it's only natural that Janrain becomes a member of OIX and we are excited to do so," said Bill Piwonka, Vice President of Marketing at Janrain. "We have always been committed to the open source movement and the belief that our industry can come together to create the standards and framework necessary to instill trust in the strength of security, privacy and operational policies for all parties involved when authenticating a user's identity online.""


  • Tim Bray: How to Think About OAuth
    "I'm not a deep OAuth 2.0 expert yet; at this point that label is reserved for the (substantial number of) people who wrote the specs. But I've worked with a few implementations and talked it over with smart people, and I have opinions. Summary: It's a framework not a protocol, it has irritating problems, and it's really very useful."


  • Personal Clouds - Community Gathering
    "Personal Data Ecosystem Consortium
    Tuesday, January 29, 2013 from 6:00 PM to 9:00 PM (PST)
    San Francisco, CA"
  • IDESG 3rd Plenary Meeting
    "February 5-7, 2013
    Phoenix Convention Center"
  • IdentityWoman: European Identity Workshop in Feb`
    "The European Identity Workshop.
    February 12-13 in Vienna.
    Registration is here.
    Internet identity, identity federation and personal data online are complex, continually evolving areas. The event is inspired by similar events such as the Internet Identity Workshop in California, Identity North in Canada, and Identity Next in the Netherlands, with a focus on European perspectives and initiatives. At EIW, participants will seek deeper understanding, and better solutions to challenges like:"
  • Kantara Initiative to Appear at HIMSS13
    "New Orleans welcomes the 2013 HIMSS Annual Conference and Exhibition, March 3-7, 2013, at the Ernest N. Morial Convention Center. More than 36,000 healthcare industry professionals are expected to attend to discuss health information technology issues and review innovative solutions designed to transform healthcare."
  • 5th Federated identity management for research communities (FIM4R) Meeting
    "Villigen (Switzerland), 20-21 March 2013
    This workshop in the fifth in a series that started in summer 2011 to investigate Federated Identity Management for Research (FIM4R) collaborations."
  • First eID-Network Conference
    "Brussels, 20 March 2013
    The first eID-Network Conference will be held on March 20th 2013 in the Egmont Palace in Brussels, in close cooperation with the annual EPCA Payment Summit. The eID network conference focuses on eID in relation to online services toward persons, businesses and governments. We believe eID and related concepts are crucial for advancing e-business transactions, therefore we refer to this as 'transactional eID'."
  • Internet Identity Workshop XVI #16 - 2013A
    "Phil Windley, Kaliya Hamlin, & Doc Searls
    Tuesday, May 7, 2013 at 8:00 AM - Thursday, May 9, 2013 at 4:00 PM (PDT)
    Mountain View, CA
    Super Early Bird Ticket Feb 18, 2013"
  • European Identity & Cloud Conference 2013
    "May 14 - 17, 2013 at the Dolce Ballhaus Forum Unterschleissheim, Munich/Germany,"

Cloud Computing

  • Dave Miller: Cloud-based Identity Management Platforms Improve Joint Venture Performance and Security
    "Companies in a joint venture situation need a secure, easy way to share information across a common portal. It is important that there is a quick mechanism for adding and removing either business partners or contractors on the project (especially for remote drilling projects) and still keeping the data secure."
  • Craig Burton: Cloud Computing and Standards
    "I bring up the distinction of these three standards because I think that what we can expect is to see a rapid proliferation of de Riguer standards that are built on top both de Facto and de Jure standards that are highly usable and can be referred to and used as "standards" that can provide interoperability without either a laborious and expensive de Jure process or the expectation of an accidental de Facto crown."
  • Phil Windley: Some Benefits of Decentralized Design and Modeling
    "Some of the problems we face online, like privacy, control, and access to data are solved when we consider decentralized approaches. This blog post discusses several benefits of decentralized design and modeling."


Valuable Identity

  • Signifyd: Using Social Network Data in Fraud Prevention
    "Some of the most common questions we get asked are around social data. How do you use social data in fraud prevention? What's the right way to leverage social network analysis in fraud investigations and real time decisions? We've had to deal with this issue with many of our customers, and found a few major obstacles and some very interesting use cases."
  • Can Ripple Solve BitCoin's Problems?
    "In reality, trying to popularize BitCoin by solving the problems of the exchanges is like trying to put out a house fire with a teaspoon of water. Yes, the instability of BitCoin value is a serious problem for the digital currency, and Ripple can help mitigate that instability. But the real problem for BitCoin is the lack of demand for it. BitCoin's two major advantages are privacy and a lack of discount fees for merchants. The vast majority of consumers willing to abandon the dollar in order keep their transactions private are those engaging in illicit or embarrassing actions. This is the central problem. To have a chance at becoming a mainstream currency, BitCoin needs to lose its reputation as money for drug dealers, gamblers and pornographers. But most people with a motivation to use BitCoin are the ones patronizing those industries. Now that's what's known as a fundamental problem."


* Required Fields