identity

Persona partners with Okta to optimise workforce identity security

US-based identity platform Persona has partnered with Okta to deliver an automated identity verification solution and support organisations to safeguard against phishing and deepfakes. 




identity

Ganezza’s Visual Identity: A Dynamic Branding Journey

Ganezza’s Visual Identity: A Dynamic Branding Journey

abduzeedo

Explore Ganezza’s vibrant branding and visual identity, designed by Turan Ramazanli, that captures energy and warmth.

Ganezza, a home furnishings retailer based in the Netherlands with locations in Schiedam and Amsterdam, has recently unveiled a striking new visual identity designed by Turan Ramazanli. This rebrand perfectly encapsulates Ganezza’s modern, inviting essence while enhancing its presence in the competitive home decor market.

Color Palette: Warmth and Creativity in Every Shade

A key element of Ganezza’s new identity is the vibrant color palette. Orange dominates, chosen for its warmth and ability to evoke feelings of happiness. This friendly, playful hue transforms spaces, making them feel full of energy and life. It’s a strategic choice, as the color not only conveys optimism but also aligns with Ganezza’s commitment to creating lively environments through their furnishings.

Balancing the bright orange are complementary tones that maintain the brand’s sophistication while allowing for moments of visual excitement. The palette is designed to be memorable, setting Ganezza apart in the home furnishings sector.

Typography and Iconography: Cohesion in Every Detail

Typography in Ganezza’s branding strikes a harmonious balance between modernity and accessibility. The typeface selection reflects a dynamic personality, making every written element clear and engaging. Icons, custom-designed to pair seamlessly with the typeface, enhance the brand’s visual language, emphasizing simplicity and cohesiveness.

This thoughtful integration of type and iconography ensures that Ganezza’s messaging is as visually appealing as it is easy to digest. Every design decision contributes to a brand identity that feels both unified and versatile, adaptable to various marketing materials and store environments.

Design Philosophy: More Than Just Looks

Turan Ramazanli’s approach goes beyond aesthetics. The visual identity was created with Ganezza’s core values in mind: quality, creativity, and exceptional customer service. By combining visual elements that evoke emotion with a functional, user-friendly design, the rebrand speaks to Ganezza’s mission of transforming spaces through high-quality, stylish furnishings.

The branding is both bold and welcoming, capturing the attention of a design-savvy audience while remaining approachable to everyday shoppers. It’s a reminder that effective visual identities don’t just look good—they communicate a brand’s story and values effortlessly.

For designers, Ganezza’s visual identity offers a masterclass in creating a cohesive brand experience. To explore more of Turan Ramazanli’s work, visit behance.net/X_Turan_X.

Branding and visual identity artifacts




identity

‘The Masked Singer’ Reveals Identity of Macaron: Here Is the Celebrity Under the Costume

SPOILER ALERT: Details follow for Season 12, Episode 7 of “The Masked Singer,” “Who Are You Fest Night,” which aired November 13 on Fox. It may have been a wipeout, but surfer Bethany Hamilton told Variety that she still enjoyed her brief appearance on “The Masked Singer.” Hamilton was the latest celebrity to be unmasked, […]




identity

Is Patrick Mahomes finally settling into Chiefs' revamped offensive identity?

Patrick Mahomes wanted to get back to a hero-ball offense this season. It didn't work out, so he's gradually reverting to last year's plan.




identity

AI Face Anonymizer Masks Human Identity in Images

We’re all pretty familiar with AI’s ability to create realistic-looking images of people that don’t exist, but here’s an unusual implementation of using that technology for a different purpose: masking …read more




identity

Deciphering Peripheral Taste Neuron Diversity: Using Genetic Identity to Bridge Taste Bud Innervation Patterns and Functional Responses

Peripheral taste neurons exhibit functional, genetic, and morphological diversity, yet understanding how or if these attributes combine into taste neuron types remains unclear. In this study, we used male and female mice to relate taste bud innervation patterns to the function of a subset of proenkephalin-expressing (Penk+) taste neurons. We found that taste arbors (the portion of the axon within the taste bud) stemming from Penk+ neurons displayed diverse branching patterns and lacked stereotypical endings. The range in complexity observed for individual taste arbors from Penk+ neurons mirrored the entire population, suggesting that taste arbor morphologies are not primarily regulated by the neuron type. Notably, the distinguishing feature of arbors from Penk+ neurons was their propensity to come within 110 nm (in apposition with) different types of taste-transducing cells within the taste bud. This finding is contrary to the expectation of genetically defined taste neuron types that functionally represent a single stimulus. Consistently, further investigation of Penk+ neuron function revealed that they are more likely to respond to innately aversive stimuli—sour, bitter, and high salt concentrations—as compared with the full taste population. Penk+ neurons are less likely to respond to nonaversive stimuli—sucrose, umami, and low salt—compared with the full population. Our data support the presence of a genetically defined neuron type in the geniculate ganglion that is responsive to innately aversive stimuli. This implies that genetic expression might categorize peripheral taste neurons into hedonic groups, rather than simply identifying neurons that respond to a single stimulus.




identity

Teaching positive identity through English club

Believers bring a positive identity message to teenage girls living in a remote village.




identity

Identity in Christ

Pari Bala, National Director of OM Malaysia, shares about her journey to Christ and missions, along with the opportunities and challenges she faces in ministry.




identity

Maharashtra Assembly Elections: List Of Approved Voter Identity Documents

Voters in Maharashtra can now use one of 12 approved identity documents, aside from the Voter Photo Identity Card (EPIC), to vote in the assembly elections on November 20. This decision by the Election Commission of India (ECI) mirrors a similar




identity

Sir Francis Bacon aka William Shakespeare - More than twenty thousand books and articles have been written about the "identity problem" regarding William Shakespeare - So lets start by looking at the actor from Stratford: All the known autograph

Let's look at Sir Francis Bacon: The content in the Shakespearian dramas are politically recognized viewpoints of Sir Francis Bacon (His "enemies" are frequently caricatured in the plays.) The religious, philosophic, and educational messages all reflect his personal opinions. Similarities in style and terminology exist in Bacon's writings and the Shakespearian plays. Certain historical and philosophical inaccuracies are common to both (such as identical misquotations from Aristotle.) Sir Francis Bacon possessed the range of general and philosophical knowledge necessary to write the Shakespearian plays. Sir Francis Bacon was a linguist and a composer. (Necessary to write the sonnets.) He was a lawyer, an able barrister and a polished courtier and possessed the intimate knowledge of parliamentary law and the etiquette of the royal court revealed in the Shakespearian plays. Bacon furthermore visited many of the foreign countries forming the background for the plays (Necessary to create the authentic local atmosphere. There is no record of William Shakspere's ever having travelled outside of England). ... Why the secrecy? Manly Palmer Hall writes: "Sir Francis Bacon knew the true secret of Masonic origin and there is reason to suspect that he concealed this knowledge in cipher and cryptogram. Bacon is not to be regarded solely as a man but rather as the focal point between an invisible institution and a world which was never able to distinguish between the messenger and the message which he promulgated. This secret society, having rediscovered the lost wisdom of the ages and fearing that the knowledge might be lost again, perpetuated it in two ways: (1) by an organization (Freemasonry) to the initiates of which it revealed its wisdom in the form of symbols; (2) by embodying its arcana in the literature of the day by means of cunningly contrived ciphers and enigmas."



  • Christian Church History Study
  • 3. 1522 A.D. to 1880 A.D. - Indigenous Bible translations and Church Doctrines era - The Reformation

identity

Wikipedia: Normans - The Normans were the people who gave their name to Normandy, a region in northern France - They were descended from Norse Viking conquerors of the territory and the native population of Frankish and Gallo-Roman stock - Their identity

They played a major political, military, and cultural role in medieval Europe and even the Near East. They were famed for their martial spirit and eventually for their Christian piety. They quickly adopted the Romance language of the land they settled, their dialect becoming known as Norman or Norman-French, an important literary language. The Duchy of Normandy, which they formed by treaty with the French crown, was one of the great fiefs of medieval France. The Normans are famed both for their culture, such as their unique Romanesque architecture, and their musical traditions, as well as for their military accomplishments and innovations. Norman adventurers established a kingdom in Sicily and southern Italy by conquest, and a Norman expedition on behalf of their duke led to the Norman Conquest of England. Norman influence spread from these new centres to the Crusader States in the Near East, to Scotland and Wales in Great Britain, and to Ireland. ... In Byzantium: Soon after the Normans first began to enter Italy, they entered the Byzantine Empire, and then Armenia against the Pechenegs, Bulgars, and especially Seljuk Turks. The Norman mercenaries first encouraged to come to the south by the Lombards to act against the Byzantines soon fought in Byzantine service in Sicily. They were prominent alongside Varangian and Lombard contingents in the Sicilian campaign of George Maniaces of 1038-40. There is debate whether the Normans in Greek service were mostly or at all from Norman Italy, and it now seems likely only a few came from there. It is also unknown how many of the "Franks", as the Byzantines called them, were Normans and not other Frenchmen. One of the first Norman mercenaries to serve as a Byzantine general was Hervé in the 1050s. By then however, there were already Norman mercenaries serving as far away as Trebizond and Georgia. They were based at Malatya and Edessa, under the Byzantine duke of Antioch, Isaac Komnenos. In the 1060s, Robert Crispin led the Normans of Edessa against the Turks. Roussel de Bailleul even tried to carve out an independent state in Asia Minor with support from the local population, but he was stopped by the Byzantine general Alexius Komnenos. Some Normans joined Turkish forces to aid in the destruction of the Armenians vassal-states of Sassoun and Taron in far eastern Anatolia. Later, many took up service with the Armenian state further south in Cilicia and the Taurus Mountains. A Norman named Oursel led a force of "Franks" into the upper Euphrates valley in northern Syria. From 1073 to 1074, 8,000 of the 20,000 troops of the Armenian general Philaretus Brachamius were Normans - formerly of Oursel - led by Raimbaud. They even lent their ethnicity to the name of their castle: Afranji, meaning "Franks." The known trade between Amalfi and Antioch and between Bari and Tarsus may be related to the presence of Italo-Normans in those cities while Amalfi and Bari were under Norman rule in Italy. Several families of Byzantine Greece were of Norman mercenary origin during the period of the Comnenian Restoration, when Byzantine emperors were seeking out western European warriors. The Raoulii were descended from an Italo-Norman named Raoul, the Petraliphae were descended from a Pierre d'Aulps, and that group of Albanian clans known as the Maniakates were descended from Normans who served under George Maniaces in the Sicilian expedition of 1038 A.D.



  • Christian Church History Study
  • 2. 313 A.D. to 1521 A.D. - Revised Rome and the Holy Roman Empire

identity

Coppin State University to Highlight Decades-Long Partnership with Fischer Identity at MEEC

Coppin State University to highlight decades-long partnership with Fischer Identity at Maryland Education Enterprise Coalition (MEEC) event sponsored by CDW.




identity

Fischer Identity to Present at HESS Consortium Webinar: Tailored IAM Solutions for Higher Education

We are thrilled to be a valued HESS / Coalition Contract Business Partner and to participate in their quarterly webinars. Bryan Leber and Chuck Donnelly are eager to provide The Higher Education Systems & Services Consortium (HESS) members with insights into Fischer Identity's unique Identity and Access Management (IAM) strategy in the upcoming week. We eagerly anticipate connecting with the HESS Consortium community and sharing our expertise.




identity

Mark Cox Joins Fischer Identity Team as Associate Vice President of Identity and Access Management Strategic Advisory Services

Mark Cox Joins Fischer Identity Team as Associate Vice President of Identity and Access Management Strategic Advisory Services.




identity

Fischer Identity and Omnia Partners Announce Strategic Partnership

Procurement Giant Puts its Purchasing Power with Best of Breed Identity Solutions.




identity

CyberstarPay unites with iDenfy to ensure safe payments with remote identity verification

iDenfy's real-time document and live face-matching services will secure CyberstarPay's network.




identity

Paynovate confirms partnership with iDenfy to enhance security with identity verification

The global remote identity verification company will provide assurance for Paynovate's customers.




identity

The future of secure digital customer onboarding: With PXL Ident from fully automated identity verification to electronic signature

Swiss identity verification provider PXL Vision AG is responding to the growing demands on businesses. With the market launch of the software-as-a-service solution PXL Ident in April this year, the provider is expanding its AI-supported biometric identification process, which offers companies a secure way of verifying identity in online interactions.




identity

Fischer Identity Launches New Brand Logo

Fischer Identity Unveils Stunning New Logo Reflecting a Vision for a Secure Future.




identity

Fischer Identity Launches Version 8.1

Introducing Fischer Identity & Access Management 8.1: Elevating User Experience and Functionality.




identity

Energy at its best: German battery pioneer CustomCells unveils new brand identity

Premium battery manufacturer CustomCells has sharpened its brand positioning, launched a fresh corporate design, and introduced its new brand slogan, "Energy at its best".




identity

About Your Habitat - Identity Card Application Part 6


The latest part of its Identity Cards Initiative, About Your Habitat will collect details about where you live in order to plan the best route to follow you home.

The forms add a twist to the previous techniques of claimant oppression and data-gathering: that of...





identity

Jesus' Preparation For Ministry Pt2: Learning To Minister From Identity

Many of us have been conditioned by life and culture to serve to obtain identity rather than ministering from our identity in Christ. Jesus knew who He was and what the Father thought of Him; this impacted how He served God. However, many of us behave as orphans in ministry, which often ends in our own hurt and that of others. In this message on 'Learning To Minister From Identity', David teaches us to minister from identity as children of God rather than ministering from identity like orphans. This message is available at https://www.preachtheword.com now in MP3 audio format and in HD video on our YouTube Channel (https://youtube.com/PreachTheWord)...



  • Religion & Spirituality

identity

PodPass wants to build the identity layer for podcasting

There is an industry trend toward more direct listener monetization and engagement. This includes crowdfunding, membership, tipping, and donations, as well as exclusive and premium content.

This is a healthy development — expanding the range of touch points with listeners beyond the ad impression and helping publishers diversify their revenue and business models. The trend speaks to the depth of experience that spoken-word audio elicits, and it encompasses other podcast engagement strategies such as live shows, email newsletters, fan clubs, surveys, and experiments with personalization and interactivity.

PodPass wants to build the identity layer for podcasting




identity

Illinois Becomes First State to Launch Identity Theft Hotline

February 9, 2006 – Illinois Attorney General Lisa Madigan has announced that her office has launched an identity theft hotline. The hotline will be staffed with consumer advocates, with the specific task of assisting victims with repairing their credit. It is the first service of its kind offered by any state in the country.




identity

Internet Identity Workshop XXXVIII Report

Summary: This spring's IIW was full of interesting people and interesting discussions with people from around the globe.

We recently completed the 38th edition of the Internet Identity Workshop. We had 330 people from around the world who called 169 sessions. As usual there was lots of energy and thousands of side conversations. IIW is a place to get things done and it showed in the energy and the comments people made to me about how much they enjoyed it.

Tuesday opening (click to enlarge)

As you can see by the pins in the map at the top of this post, there were attendees from all over the world. Not surprisingly, most of the attendees were from the US (241), followed by Canada (11). Germany, India, and Switzerland rounded out the top five with 9, 8, and 7 attendees respectively. Attendees from India (5), Thailand (3), and Korea (3) showed IIW's diversity with attendees from APAC. And there were 4 attendees from South America this time. Sadly, there were no attendees from Africa again. Please remember we offer scholarships for people from underrepresented areas, so if you'd like to come to IIW39, please let us know. If you're working on identity, we want you there.

Demo hour on Wednesday (click to enlarge)

For states and provinces, California was first with 122. Washington (16), Utah (10), Texas (10) and New York (10) rounded out the top five. San Francisco (14) Oakland (13), San Jose (12), Seattle (11), and New York (9) were the top cities.

Drummond Reed conducts a session (click to enlarge)

In addition to sessions, we have a demo hour on Wednesday that is a little like speed dating. There were 20 different projects highlighted. There's always more than one session that I want to attend in any given time slot and choosing is hard. That's a common refrain. Luckily we have sessions notes that we publish in a Book of Proceedings.

Here's pictures from all three days courtesy of Doc Searls

 

You belong at IIW! IIW is where you will meet people to help you solve problems and move your ideas forward. Please come! IIW 39 will be held October 29-31, 2024 at the Computer History Museum. We'll have tickets available soon.

Tags:




identity

Decentralized Identity Comes of Age

Summary: In session after session, attendees at EIC are hearing the message that decentralized identity is the answer to their identity problems.

I'm at European Identity Conference (EIC) this week. I haven't been for several years. One thing that has struck me is how much of the conversation is about decentralized identity and verifiable credentials. I can remember when the whole idea of decentralized identity was anathema here. The opening keynote, by Martin Kuppinger is Vision 2030: Rethinking Digital Identity in the Era of AI and Decentralization. And all he's talking about is decentralized identity and how it's at the core of solving long standing identity problems. Another data point: Steve McCown and Kim Hamilton-Duffy ran a session this morning called Decentralized Identity Technical Mastery which was a hands-on workshop. The rather large room was packed—standing room only.

I attended a couple of sessions on decentralized identity where I didn't know the companies, the speakers, or the specific platforms they were using. The space is too big to keep track of anymore. Identity professionals who were ignoring, or talking down, decentralized identity a few years ago are now promoting it.

This truly feels like a tipping point to me. At IIW, it's identity geeks talking with other identity geeks, so it's no surprise to see lots of discussion about new things. EIC is a different kind of conference. There are about 1000 people here I'd guess. Most of them aren't working on new standards or open source projects. Instead they're the folks from companies who come to conferences like EIC to learn how to solve the problems their organization is facing.

In the keynotes and in numerous sessions, the message that they're hearing is "decentralized identity will solve your problems." Martin closed his talk with the proclamation that "decentralized identity is the new paradigm for identity."


Photo Credit: Credential Tipping Point by DALL-E (public domain) Prompt: Draw a rectangular picture that shows a credential at a tipping point. Make the credential look like a lifelike credential, include cartoon picture, and some writing. Use bright friendly colors.

Tags:




identity

What Is Decentralized Identity?

Summary: What is decentralized identity and why is it important? My attempt at a simple explanation.

In Yeah, yeah, yeah, yeah, yeah, nah, Alan Mayo references my recent blog post, Decentralized Identity Comes of Age, and says:

My challenge to the decentralization community is for them (someone) to explain how it works in relatively simple and reasonable terms. I say relative because identity is not simple, so we should not expect simple solutions.

This post is my attempt to do that for Alan and others.

Identity is how we recognize, remember, react to, and interact with other people, organizations, and services. Put another way, identity is about relationships. Online we suffer from a proximity problem. Since we're not near the parties we want to have relationships with, our natural means of recognizing, remembering, and interacting with others can't be used. Digital identity systems are meant to provide us with the means of creating online relationships.

Traditional identity systems have not served us well because they are owned and controlled by companies who build them for their own purposes. The relationships they support are anemic and transactional. We can't use them for any purpose except what their owner's allow.

Decentralized identity systems1 on the other hand allow you to create online relationships with any person, organization, or service you choose and give you the tools to manage and use those relationships. They help you recognize, remember, react to, and interact with them. The most important tool is a decentralized identity wallet. The world of decentralized identity wallets is still young, but organizations like the Linux Foundation's Open Wallet Foundation give me hope that useful, interoperable wallets are a tool we'll all be able to use soon. They are as foundational to decentralized identity as a browser is to the web.

Besides helping you manage peer-to-peer relationships with others online, wallets hold verifiable credentials, the digital analog to the credentials and cards you carry in a physical wallet. One of the most important aspects of digital relationships is providing information about yourself to those you interact with. Sometimes that information can come from you—it's self-asserted—but many times the other party wants to reliably know what others say about you. For example, if you establish a banking relationship, the bank is legally obligated to verify things like your name and address independent of what you say. Decentralized identity wallets allow you to prove things about yourself using credentials others provide to you. At the same time, they protect your privacy by limiting the information disclosed and forgoing the need for the party you're interacting with to directly contact others to verify the information you provide.

In summary, decentralized identity systems allow you to create digital relationships with other parties independently, without relying on any other organization or service. These relationships are direct, private, and secure. They also provide the means for you to prove things about yourself inside these relationships so that even though you're operating at a distance, you and the other party can have confidence in the relationship's authenticity.

How Does It Work

The preceding paragraphs say what decentralized identity is, and provide its benefits, but don't say how it works. Alan and others will likely want a few more details. Everything I describe below is handled by the wallet. The person using the wallet doesn't need to have any more knowledge of how they work than the operator of a browser needs to understand HTTP and HTML.

The foundation of a peer-to-peer, decentralized online relationship is an autonomic identifier like a peer DID. Identifiers are handles that someone else can use to identify someone or something else online. Peer DIDs can be created by a wallet at will, they're free, and they're self-certifying (i.e., there's no need for a third party). A relationship is created when two identity wallets create and exchange peer DIDs with each other on behalf of their owners. Peer DIDs allow the parties to the relationship to exchange private, secure messages.

There are four primary interaction patterns that wallets undertake when exchanging messages:

  1. DID Authentication which uses the DIDs to allow each party to authenticate the other
  2. Single-Party Credential Authorization where the same party issues and verifies the credential.
  3. Multi-Party Authorization where the credential issuer and verifier are different parties.
  4. Generalized Trustworthy Data Transfer which uses a collection of credentials to aid the wallet owner in completing online workflows.
Generalized Credential Exchange Pattern (click to enlarge)

Verifiable credentials make heavy use of cryptography to provide not only security and privacy, but also confidence that the credential data is authentic. This confidence is based on four properties a properly designed credential presentation protocol provides:

  1. The identifier of the credential issuer
  2. Proof that the credential is being presented by the party is was issued to
  3. Proof that the credential has not been tampered with
  4. The revocation status of the credential

The credential presentation can do all this while only disclosing the information needed for the interaction and without the verifier having to contact the credential issuer. Not having to contact the issuer ensures the credential can be used in situations with poor connectivity, that the issuer needn't be online, and preserves the credential subject's privacy about where the credential is being used.

A properly designed credential exchange protocol has four important properties:

  1. The system is decentralized and contextual. There is no central authority for all credentials. Every party can be an issuer, an owner, and a verifier. The system can be adapted to any country, any industry, any community, any set of credentials, any set of trust relationships.
  2. Issuers are free to determine what credentials to issue and whether or not to revoke them.
  3. Wallet owners are free to choose which credentials to carry and where and when they get shared. While some verifiers require a specific credential—such as a customs agent requiring a passport—others will accept a range of credentials. Therefore owners can decide which credentials to carry in their wallet based on the verifiers with whom they interact.
  4. Verifiers make their own decisions about which credentials to accept. For example, a bar you are trying to enter may accept any credential you have about your date of birth. This means some credentials (e.g., passports, driving licenses, birth certificates) may be much more useful than just for the original purpose for which they were issued.

These properties make a decentralized identity system self sovereign.

Why is Decentralized Identity Important?

Decentralized identity systems are designed to provide people with control, security, and privacy while enhancing the confidence we have in our online relationships. Some time ago, I wrote the following. I think it's an apt way to close any discussion of decentralized identity because unless we keep our eyes on the goal, we'll likely take shortcuts in implementation that fail to live up to their promise.

Presently, people don't have operational relationships anywhere online.2 We have plenty of online relationships, but they are not operational because we are prevented from acting by their anemic natures. Our helplessness is the result of the power imbalance that is inherent in bureaucratic relationships. The solution to the anemic relationships created by administrative identity systems is to provide people with the tools they need to operationalize their self-sovereign authority and act as peers with others online. Peer-to-peer relationships are the norm in the physical world. When we dine at a restaurant or shop at a store in the physical world, we do not do so under the control of some administrative system. Rather, we act as embodied agents and operationalize our relationships, whether they be long-lived or nascent, by acting for ourselves. Any properly designed decentralized identity system must provide people with the tools they need to be "embodied" in the digital world and act autonomously.

Time and again, various people have tried to create decentralized marketplaces or social networks only to fail to gain traction. These systems fail because they are not based on a firm foundation that allows people to act in relationships with sovereign authority in systems mediated through protocol rather than by the whims of companies. We have a fine example of a protocol mediated system in the internet, but we've failed to take up the daunting task of building the same kind of system for identity. Consequently, when we act, we do so without firm footing or sufficient leverage.

Ironically, the internet broke down the walled gardens of CompuServe and Prodigy with a protocol-mediated metasystem, but surveillance capitalism has rebuilt them on the web. No one could live an effective life in an amusement park. Similarly, we cannot function as fully embodied agents in the digital sphere within the administrative systems of surveillance capitalists, despite their attractions. The emergence of self-sovereign identity, agreements on protocols, and the creation of metasystems to operationalize them promises a digital world where decentralized interactions create life-like online experiences. The richer relationships that result from properly designed decentralized identity systems promise an online future that gives people the opportunity to act for themselves as autonomous human beings and supports their dignity so that they can live an effective online life.


Notes

  1. I prefer the term self-sovereign to decentralized because it describes the goal rather than the implementation, but I'll stick with decentralized here. All self-sovereign identity systems are decentralized. Not all decentralized identity systems are self-sovereign.
  2. The one exception I can think of to this is email. People act through email all the time in ways that aren't intermediated by their email provider. Again, it's a result of the architecture of email, set up over four decades ago and the culture that architecture supports.

Photo Credit: Young Woman Using a Wallet from DALL-E (public domain) Prompt: draw a rectangular picture of a young woman using a wallet.

Tags:




identity

Digital Identity and Access Control

Summary: Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours.

In response to a post on X about China's social credit system, Paul Conlon said:

Digital ID is ultimately about access control where those who impose the system are the ones determining what you are required to be and do.

Provision of resources and liberties become conditional upon the whims of the affluent. Doesn't sound safe or convenient to me.

From X
Referenced 2024-08-28T08:10:31-0400

How Paul said this struck me because I've been thinking a lot about access control lately. I believe that we build identity systems to manage relationships, but, as Paul points out, in many cases the ultimately utility of identity systems is access control.

This isn't, by itself, a bad thing. I'm glad that Google controls access to my GMail account so that only I can use it. But it doesn't stop there. If I use my Google account to log into other things, then Google ultimately controls my access to everything I've used it for. This is federation's original sin1.

Paul's comment points out the primary problem with how we build identity systems today: when access control is centralized, it inherently shifts power towards those who manage the system. This dynamic can lead to a situation where individuals must conform to the expectations or demands of those in control, just to maintain their access to essential services or resources. While we often accept this trade-off for convenience—like using Google to manage multiple logins—the broader implications are troubling.

The more we rely on federated identity systems, with their tendency to centralization, the more we risk ceding control over our digital lives, reducing our autonomy, and increasing our dependence on entities whose goals may not align with our own. This is why the principles of self-sovereign identity (SSI) are so compelling. SSI proposes a model where individuals maintain control over their own identity, reducing the risks associated with centralized access control and enhancing personal freedom in the digital realm.

Critics of SSI will claim that giving people control over their identity means we have to accept their self assertions. Nothing could be further from the truth. When someone wants me to prove I'm over 18, I use a driver's license. The state is asserting my age, not me. But I'm in control of who I show that to and where. Sovereignty is about borders and imposes a system of relationships.

Now, China could use decentralized identity technology to build their social credit system. One credential, controlled by the state, that is used to access everything. Technology alone can't solve this problem. As a society, we have to want a digital world, modeled on the physical one, where individuals are the locus of control and use information and assertions from a variety of credentials to build and interact in authentic peer-to-peer relationships. Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours.


Notes

  1. For similar reasons, I think federated social media systems are a bad idea too, but that's another blog post.

Photo Credit: Papers Please from DALL-E (public domain). Prompt: Draw a rectangular picture of police checking identity papers of people on the street

Tags:




identity

Internet Identity Workshop XXXIX Report

Summary: We held the 39th edition of Internet Identity Workshop last week. Like always, it was a great week.

The 39th edition of the Internet Identity Workshop wrapped up last week. We have 364 attendees from around the world who called 178 sessions. I can't begin to describe the energy of the identity community when they all get together to discuss their favorite topics. If you like identity, or simply want to be part of an enthusiastic technical community, you should come to IIW.

As you can see by the pins in the map at the top of this post, there were attendees from all over the world. Not surprisingly, most of the attendees were from the US (251), followed by Canada (18) and France (14). Germany, Japan, and Australia rounded out the top six with 12, 9, and 7 attendees respectively. Attendees from India (5), Columbia (3), and Chile (2) show IIW's geographic diversity. Sadly, there were no attendees from Africa again. Please remember we offer scholarships for people from underrepresented areas, so if you'd like to come to IIW40, please let us know. If you're working on identity, we want you there.

For states and provinces, California was first with 131 attendees. Washington (19), Utah (14), New York (9), and Massachusetts (9) made up the rest of the top 5. San Jose (20), San Francisco (16), Paris (12), Oakland (11), and Seattle (9) were the top five cities.

We'll have the book of proceedings out in a month or so with notes from the different sessions and descriptions of the 20 demos given during demo hour. Past proceedings are available here.

The next IIW takes place April 8-10, 2025 at the Computer History Museum. This will be IIW XL, number 40! We'll have registration open the first part of December. If you're interested in sponsoring, send me a note.

Tags:




identity

A Peculiar People: Orthodox Christian Identity in a Hostile World - Part 1

How should our lives differ from the world as Orthodox Christians? Fr. Andrew challenges us to embrace our faith amidst a growingly hostile environment.




identity

A Peculiar People: Orthodox Christian Identity in a Hostile World - Part 2

In part 2, Fr. Andrew focuses on the importance of worship as Christians.




identity

True Identity

From the story of the healing of the Gadarene demoniac, Fr. Philip LeMasters shares about how we can become our true selves in Christ.




identity

Identity

Fr. Ted speaks to us about the true identity of Christ in this Palm Sunday homily.




identity

Identity Crisis

Fr. Ted address three issues that he has encountered in his local parish which speak to the heart of our identity as Orthodox Christians.




identity

How to Be a Sinner: Like I Need This? The Sinner Identity and Its Gifts

To see ourselves as God sees us is real truth and part of that is to see ourselves as sinners when revealed by the divine light. Dn. Michael Hyatt is teaching through How to Be a Sinner by Dr. Peter Bouteneff.




identity

Identity: Interview with Fr. Raymond Browne

Dr. Rossi, interviews Fr. Raymond Browne, Rector of St. Mark's Orthodox Church (OCA) in Wrightstown, PA, on the topic of identity.




identity

Identity

Dr. Rossi ponders the question, "Who am I?"




identity

OAuth2 Introspection with WSO2 ESB and WSO2 Identity Server

The OAuth2 specification defines several parties: the Client, the Resource Owner, the Authorization Server and the Resource Server. Here is the (textual) diagram from the spec:



     +--------+                               +---------------+
     |        |--(A)- Authorization Request ->|   Resource    |
     |        |                               |     Owner     |
     |        |<-(B)-- Authorization Grant ---|               |
     |        |                               +---------------+
     |        |
     |        |                               +---------------+
     |        |--(C)-- Authorization Grant -->| Authorization |
     | Client |                               |     Server    |
     |        |<-(D)----- Access Token -------|               |
     |        |                               +---------------+
     |        |
     |        |                               +---------------+
     |        |--(E)----- Access Token ------>|    Resource   |
     |        |                               |     Server    |
     |        |<-(F)--- Protected Resource ---|               |
     +--------+                               +---------------+

                     Figure 1: Abstract Protocol Flow

One flow that is not defined by the OAuth specification is any flow from the Resource Server to the Authorization server to validate an existing Bearer Token (or other token). 
The spec says:
The interaction between the authorization server and resource server is beyond the scope of this specification.  The authorization server may be the same server as the resource server or a separate entity. A single authorization server may issue access tokens accepted by multiple resource servers.
In many cases the Authorization server offers an API to access this. For example, Google allows you to call a TokenInfo APIto validate tokens. Similarly Facebook offers an API to "debug" a token. The WSO2 Identity Server also offers an API, but (shock and horror) we don't document it yet. The ESB and API manager both utilize this API to validate OAuth2 bearer tokens. The ESB code is of course available, and with a quick look at the code and also the use of TCPMON it didn't take me long to reverse engineer the API. This Gist has a sample HTTP SOAP request against the WSO2 IS to validate a token:
It turns out that the OAuth Working Group at the IETF is working on this and has a draft specification available, using a RESTful service. They call this OAuth Token Introspection. I figured this would be easier (and more pleasant) to call from my Python code, so I knocked up a quick WSO2 ESB API mediation flow to convert from the RESTful API to the existing WSO2 SOAP-based API.
I know that Prabath and the security and identity team at WSO2 will soon add this useful REST API, but in the meantime, here is a quick hack to help you out. Please note you need to hardcode the URL of the IS and the userid/password into the ESB flow. Also I assume if you don't provide a token_type_hint then this is a bearer token. And here is the Gist showing a sample interaction: 




identity

Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes

This paper systematically discusses the security and privacy concerns for e-learning systems. A five-layer architecture of e-learning system is proposed. The security and privacy concerns are addressed respectively for five layers. This paper further examines the relationship among the security and privacy policy, the available security and privacy technology, and the degree of e-learning privacy and security. The digital identity attributes are introduced to e-learning portable devices to enhance the security and privacy of e-learning systems. This will provide significant contributions to the knowledge of e-learning security and privacy research communities and will generate more research interests.




identity

Where Else Have You Been? The Effects of Diaspora Consciousness and Transcultural Mixtures on Ethnic Identity




identity

In Search of New Identity for LIS Discipline, with Some References to Iran




identity

Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption




identity

Accelerated Professional Identity Development Through Social Network Sites

Aim/Purpose: This study aims to uncover how Social Network Sites (SNSs) active users who are eager to be knowledgeable about a specific domain develop a professional identity, what practices they use, and how do SNSs afford professional identity development. Background: Some researchers have shown that SNSs play a central role in personal development, but there is a lack of studies tracing the actual role of SNSs affordances in professional identity development. Methodology: Seven participants were followed during a whole year; we examined their professional identity development based on data collected from interviews, cued retrospective reports, and online activities. Contribution: The study shows that SNSs create a new context for professional identity development, a context whose new characteristics bring specific actors to a spectacular development in their professional identity. Based on the findings we suggest a new framework of professional identity development with SNSs. Findings: We identified a wide range of activities and changes in the perceived professional identity. We found that there are four phases of SNS’s professional identity development. The study also uncovers the three aspects of identity development: self-presentation, around-the-clock sociality, and interaction with information. The model of professional development through intensive use of SNSs is validated by our reports on the actual behaviors afforded by SNSs. Recommendations for Practitioners: The conceptual framework displayed in the article can help educational institutions to implement SNSs in order to enhance professional identity development. Guidance will allow students to handle self-presentation, sociality, and information management. By doing so, the guides will help achieving meaningful SNS activities and encouraging students to be involved in their fields of interest, thereby enhancing their professional identity. Future Research: Future studies may examine the implementation of SNSs for the exploration process leading to identity development in various educational institutions. A few years longitudinal study may examine the lifelong professional identity development in varied SNSs. Moreover, in the COVID-19 world crisis when life is in digital spaces more than ever, it will be interesting to study the role of SNSs of professional identity development in the population that lost their jobs.




identity

Managing the Consequences of Organizational Stigmatization: Identity Work in a Social Enterprise

In this inductive study, we shift the focus of stigma research inside organizational boundaries by examining its relationship with organizational identity. To do so, we draw on the case of Keystone, a social enterprise in the East of England that became stigmatized after it initiated a program of support for a group of migrants in its community. Keystone's stigmatization precipitated a crisis of organizational identity. We examine how the identity crisis unfolded, focusing on the forms of identity work that Keystone's leaders enacted in response. Interestingly, we show not only that the internal effects of stigmatization on identity can be managed, but also that they may facilitate unexpected positive outcomes for organizations.




identity

CHANGING WITH THE TIMES: AN INTEGRATED VIEW OF IDENTITY, LEGITIMACY AND NEW VENTURE LIFE CYCLES

In order to acquire resources, new ventures need to be perceived as legitimate. For this to occur, a venture must meet the expectations of various audiences with differing norms, standards, and values as the venture evolves and grows. We investigate how the organizational identity of a technology venture must adapt to meet the expectations of critical resource providers at each stage of its organizational life cycle. In so doing, we provide a temporal perspective on the interactions between identity, organizational legitimacy, institutional environments, and entrepreneurial resource acquisition for technology ventures. The core assertion from this conceptual analysis is that entrepreneurial ventures confront multiple legitimacy thresholds as they evolve and grow. We identify and discuss three key insights related to entrepreneurs' efforts to cross those thresholds at different organizational life cycle stages: institutional pluralism, venture-identity embeddedness and legitimacy buffering.




identity

Protecting Market Identity: When and How Do Organizations Respond to Consumers' Devaluations

This article examines the conditions under which organizations publicly respond to unfavorable consumer evaluations that challenge their market identity. Because organizations' market identities are certified by expert evaluations, consumers' devaluations that challenge these expert evaluations represent an identity threat. However, organizations do not always react to consumers' devaluations because of the risks associated to public responses. Hence, we first predict that organizations are more likely to respond to severe devaluations than to weaker ones; second, we propose that organizations, when faced with severe devaluations, are more likely to craft responses that justify their actions and behaviors. We further contend that, for any market identity under consideration, an organization's reputation amplifies these relationships. Analyses of a dataset of London hoteliers' responses to online reviews posted on TripAdvisor during the period 2002-2012 lend substantial support to our hypotheses.




identity

An Identity Based Approach to Social Enterprise

Social enterprise has gained widespread acclaim as a tool for addressing social and environmental problems. Yet, because these organizations integrate the social welfare and commercial logics, they face the challenge of pursuing goals that frequently conflict with each other. Studies have begun to address how established social enterprises can manage these tensions, but we know little about how, why, and with what consequences social entrepreneurs mix competing logics as they create new organizations. To address this gap, we develop a theoretical model based in identity theory that helps to explain: (1) how the commercial and social welfare logics become relevant to entrepreneurship, (2) how different types of entrepreneurs perceive the tension between these logics, and (3) the implications this has for how entrepreneurs go about recognizing and developing social enterprise opportunities. Our approach responds to calls from organizational and entrepreneurship scholars to extend existing frameworks of opportunity recognition and development to better account for social enterprise creation.




identity

Norton 360 Standard (2 Device) w/ LifeLock Identity Advisor – Includes Antivirus, VPN, and Identity Theft Restoration Support - $29.99

...