Internet Identity Workshop XXXVIII Report
This spring's IIW was full of interesting people and interesting discussions with people from around the globe.
Continue reading...
Using X.509 Certs for DID Provenance
The abundance of X.509 certificate authorities who already perform identity proofing for businesses provides a rich resource that can be leveraged to boot the verifiable data ecosystem.
Continue reading...
Relationships are Entangled
People aren't digitally embodied. As a result, their online relationships are anemic. As we think about the kinds of digital identity systems that will help people live authentic online lives, we must build identity systems that give people tools to operationalize rich digital relationships.
Continue reading...
Web 2.0 is Collapsing Under its Own Weight
The overhead of performing even simple tasks online is getting larger and larger. I question the security of almost all these supposedly "secure" messaging systems. And I'm tired of the 'Utopia of Rules' mindset pervasive in every organization. It's exhausting how they expect customers to constantly adapt to their needs.
Continue reading...