Stephen Wilson, @Steve_Lockstep, lives in Oz. He is famous as an anti-federation curmudgeon (and has many good points). Here he reminds us that in some parts of the world (in this case, Australia), privacy is what the law says it is:
Stephen Wilson: Let's talk about privacy, in engineering terms "Online, we're talking about data privacy, or data protection, but systems designers tend to bring to work a spectrum of personal outlooks about privacy in the human sphere. Yet what matters is the precise wording of data privacy law, like Australia's Privacy Act. To illustrate the difference, here's the sort of experience I've had time and time again."
There were many more items of interest to the identerati:
OpenID Connect: Salesforce.com works with OIDF members to transform the future of enterprise identity "The explosion of enterprise apps has made managing access and identity needlessly complex. Users are frustrated with juggling multiple log-ins, and enterprise IT is frustrated with managing secure access across all of these apps. Salesforce.com is collaborating with other OpenID Foundation industry leaders to make OpenID Connect more viable for the modern enterprise, with its unique security needs, increasing numbers of connected apps and sprawling mobile device users."
Janrain Joins OIX to Help Build the Open Identity Trust Framework ""As a founding member of the OpenID Foundation, it's only natural that Janrain becomes a member of OIX and we are excited to do so," said Bill Piwonka, Vice President of Marketing at Janrain. "We have always been committed to the open source movement and the belief that our industry can come together to create the standards and framework necessary to instill trust in the strength of security, privacy and operational policies for all parties involved when authenticating a user's identity online.""
Tim Bray: How to Think About OAuth "I'm not a deep OAuth 2.0 expert yet; at this point that label is reserved for the (substantial number of) people who wrote the specs. But I've worked with a few implementations and talked it over with smart people, and I have opinions. Summary: It's a framework not a protocol, it has irritating problems, and it's really very useful."
IdentityWoman: European Identity Workshop in Feb` "The European Identity Workshop. February 12-13 in Vienna. Registration is here. Internet identity, identity federation and personal data online are complex, continually evolving areas. The event is inspired by similar events such as the Internet Identity Workshop in California, Identity North in Canada, and Identity Next in the Netherlands, with a focus on European perspectives and initiatives. At EIW, participants will seek deeper understanding, and better solutions to challenges like:"
Kantara Initiative to Appear at HIMSS13 "New Orleans welcomes the 2013 HIMSS Annual Conference and Exhibition, March 3-7, 2013, at the Ernest N. Morial Convention Center. More than 36,000 healthcare industry professionals are expected to attend to discuss health information technology issues and review innovative solutions designed to transform healthcare."
First eID-Network Conference "Brussels, 20 March 2013 The first eID-Network Conference will be held on March 20th 2013 in the Egmont Palace in Brussels, in close cooperation with the annual EPCA Payment Summit. The eID network conference focuses on eID in relation to online services toward persons, businesses and governments. We believe eID and related concepts are crucial for advancing e-business transactions, therefore we refer to this as 'transactional eID'."
Internet Identity Workshop XVI #16 - 2013A "Phil Windley, Kaliya Hamlin, & Doc Searls Tuesday, May 7, 2013 at 8:00 AM - Thursday, May 9, 2013 at 4:00 PM (PDT) Mountain View, CA Super Early Bird Ticket Feb 18, 2013"
Craig Burton: Cloud Computing and Standards "I bring up the distinction of these three standards because I think that what we can expect is to see a rapid proliferation of de Riguer standards that are built on top both de Facto and de Jure standards that are highly usable and can be referred to and used as "standards" that can provide interoperability without either a laborious and expensive de Jure process or the expectation of an accidental de Facto crown."
Signifyd: Using Social Network Data in Fraud Prevention "Some of the most common questions we get asked are around social data. How do you use social data in fraud prevention? What's the right way to leverage social network analysis in fraud investigations and real time decisions? We've had to deal with this issue with many of our customers, and found a few major obstacles and some very interesting use cases."
Can Ripple Solve BitCoin's Problems? "In reality, trying to popularize BitCoin by solving the problems of the exchanges is like trying to put out a house fire with a teaspoon of water. Yes, the instability of BitCoin value is a serious problem for the digital currency, and Ripple can help mitigate that instability. But the real problem for BitCoin is the lack of demand for it. BitCoin's two major advantages are privacy and a lack of discount fees for merchants. The vast majority of consumers willing to abandon the dollar in order keep their transactions private are those engaging in illicit or embarrassing actions. This is the central problem. To have a chance at becoming a mainstream currency, BitCoin needs to lose its reputation as money for drug dealers, gamblers and pornographers. But most people with a motivation to use BitCoin are the ones patronizing those industries. Now that's what's known as a fundamental problem."