Apple announced that they will be enable their iBeacon technology in all their stores. iBeacon uses the Bluetooth low-energy protocol. Kami Haynes from UnboundID has a fascinating round-up of all the tracking technologies being use in retail stores.
Darrell Etherington: Apple Turns On iBeacons In All Its 254 U.S. Stores For In-Store Notifications And More Apple will kick off this weekend by launching iBeacons functionality in all of its 254 domestic U.S. stores, according to a new report by the AP. The location-based tech will work with the official iOS Apple Store app, and will allow Apple to do things like provide you with notifications of when your order has been assembled in the in-store stock room, to noticing that you're in the iPhone section and offering you a notice about upgrading from your current device.
Kami Haynes, UnboundID: Is That Mannequin Watching You? It's likely that the last time you shopped at Macy's, Target, Cabela's, Family Dollar, Benetton or Warby Parker, you were tracked. No, not online - retail brick-and-mortar stores are tracking customers as well. Retail location analytics technologies are being used by a variety of retail outlets to gather information on customer behavior via wireless signals, facial recognition, hidden cameras and even simple tactics like zip code gathering.
There were several other items of interest this week:
David Meyer, GigaOM: Game over! NSA and partners have infiltrated World of Warcraft and Xbox Live network Are you a terrorist using virtual worlds and gaming networks to hide your communications? There's no evidence you exist, but if you do, then be warned: According to fresh revelations in the Guardian, New York Times and ProPublica, the National Security Agency and Britain's GCHQ have for years infiltrated World of Warcraft and the Xbox Live network. Hilariously, so many agents were knocking around Second Life at one point that the NSA identified a need to "deconflict" them, ensuring they weren't wasting time by spying on one another or duplicating efforts.
Gluu Web Authentication / SSO Protocol Adoption Predictions Its hard to make accurate predictions about adoption for SSO protocols. Its impossible to make a detailed model when the known inputs are so vast. With that inherent disclaimer about the difficulty of forecasting, the following graph represents Gluu's view about the likely adoption and un-adoption of three very important web authentication standards: SAML, CAS, and OAuth2 (specifically OpenID Connect).
Dave Kearns: Safer, stronger authentication In my last post ("Dogged Determination"), I briefly mentioned the FIDO alliance (Fast Identity Online) with the promise to take a closer look at the emerging internet password-replacing-authentication system this time. So I will.
Martin Kuppinger: Is there really no way to avoid shared user accounts? In various discussions over the past month, mainly in the context of Privilege Management, I raised the (somewhat provocative) claim that shared accounts are a bad thing per se and that we must avoid these accounts. The counterargument I got, though, was that sometimes it is just impossible to do so.
Anil John: Is a CSP In a Federation, Without Identity Attributes, a Token Manager? One of the interesting aspects of the service model outlined in the "Component Identity Services" Section of the FICAM TFS Trust Framework Provider Adoption Process for All Levels of Assurance (PDF) are the roles, responsibilities and expectations of each of the components. This is especially critical within the context of identity federation when you are depending upon entities outside your security/business domain for critical identity capabilities.
Google Wallet for iOS Updated With Single Sign-On, Card Adding via Camera Google Wallet for iOS today received its first update following its initial September release. Version 2.0 of the app adds a new feature that allows people to use the iPhone's camera to snap pictures of credit cards and debit cards, entering information like card number and expiration date into the app automatically.
Identity Woman: Interesting events in 2013 This is a calendar of events that I know in 2013 (and beyond). I think they're interesting, I'm currently planning on attending all the events in BLACK, I'm helping co-organize all the events with RED headlines. Some events will change from interesting to attending as they approach.
Kantara Initiative: 2014 Events on the Horizon As we move to close 2013 we're already excited by all of the opportunities for 2014. Planning is underway on some exciting initiatives and great events for 2014! A taste of the details are below.
NSTIC Pilots in Motion - Jan 30: This is a special event produced by Kantara and hosted at the Department of Commerce in Washington DC. The event is an industry day that will feature NSTIC pilots where Kantara is playing a role. Event space is limited. If you're interested to join us please send an inquiry to email@example.com.
HIMSS - Feb 23-27: We're planning an amazing workshop for HIMSS 2014. The is the second year in a row Kantara will be hosting a workshop at HIMSS. This conference goes big and we love the theme: Innovation, Impact, Outcomes, Onward!
RSA - Feb 24-28: RSA is always an amazing event. We have Kantara Members appearing on conference agenda topics and we're very happy to bring the next installment of "Non-Profits on the Loose".
EIC - May 12-16: The European Identity and Cloud Conference is an event we look forward to every year. We'll be hosting another workshop at EIC in 2014. We'll be presenting around IRM, UMA, Profiling of OpenID Connect & OAuth, and much more.