MacWise version 11.56 with French Localization
French localization added. MacWise can now use English or French Menus and Dialog Boxes....
French localization added. MacWise can now use English or French Menus and Dialog Boxes....
RSS Equalizer is an amazing technology that will give you an unfair advantage over your competitors.
Thanks to all of our guests who have posted on Trip Advisor. We have been awarded a Certificate of Excellence for 2011.
Thanks to Mark and Dawn Hungerford, our intrepid cavers/archaeologists, who explored the interior of Belize in May 2011 and took these excellent pictures.
This was filmed by Nathan Hopkinson, an 11 year old boy who traveled with his camera for his Belize Vacation and edited this movie himself. Good work Nathan and thks for the video.
16th January 2013
We were fortunate to host the Mid Kent College Student Group from England during October 2013.
Summary: In session after session, attendees at EIC are hearing the message that decentralized identity is the answer to their identity problems.
I'm at European Identity Conference (EIC) this week. I haven't been for several years. One thing that has struck me is how much of the conversation is about decentralized identity and verifiable credentials. I can remember when the whole idea of decentralized identity was anathema here. The opening keynote, by Martin Kuppinger is Vision 2030: Rethinking Digital Identity in the Era of AI and Decentralization. And all he's talking about is decentralized identity and how it's at the core of solving long standing identity problems. Another data point: Steve McCown and Kim Hamilton-Duffy ran a session this morning called Decentralized Identity Technical Mastery which was a hands-on workshop. The rather large room was packed—standing room only.
I attended a couple of sessions on decentralized identity where I didn't know the companies, the speakers, or the specific platforms they were using. The space is too big to keep track of anymore. Identity professionals who were ignoring, or talking down, decentralized identity a few years ago are now promoting it.
This truly feels like a tipping point to me. At IIW, it's identity geeks talking with other identity geeks, so it's no surprise to see lots of discussion about new things. EIC is a different kind of conference. There are about 1000 people here I'd guess. Most of them aren't working on new standards or open source projects. Instead they're the folks from companies who come to conferences like EIC to learn how to solve the problems their organization is facing.
In the keynotes and in numerous sessions, the message that they're hearing is "decentralized identity will solve your problems." Martin closed his talk with the proclamation that "decentralized identity is the new paradigm for identity."
Photo Credit: Credential Tipping Point by DALL-E (public domain) Prompt: Draw a rectangular picture that shows a credential at a tipping point. Make the credential look like a lifelike credential, include cartoon picture, and some writing. Use bright friendly colors.
Tags: identity ssi decentralized+identity verifiable+credentials
Summary: What is decentralized identity and why is it important? My attempt at a simple explanation.
In Yeah, yeah, yeah, yeah, yeah, nah, Alan Mayo references my recent blog post, Decentralized Identity Comes of Age, and says:
My challenge to the decentralization community is for them (someone) to explain how it works in relatively simple and reasonable terms. I say relative because identity is not simple, so we should not expect simple solutions.
This post is my attempt to do that for Alan and others.
Identity is how we recognize, remember, react to, and interact with other people, organizations, and services. Put another way, identity is about relationships. Online we suffer from a proximity problem. Since we're not near the parties we want to have relationships with, our natural means of recognizing, remembering, and interacting with others can't be used. Digital identity systems are meant to provide us with the means of creating online relationships.
Traditional identity systems have not served us well because they are owned and controlled by companies who build them for their own purposes. The relationships they support are anemic and transactional. We can't use them for any purpose except what their owner's allow.
Decentralized identity systems1 on the other hand allow you to create online relationships with any person, organization, or service you choose and give you the tools to manage and use those relationships. They help you recognize, remember, react to, and interact with them. The most important tool is a decentralized identity wallet. The world of decentralized identity wallets is still young, but organizations like the Linux Foundation's Open Wallet Foundation give me hope that useful, interoperable wallets are a tool we'll all be able to use soon. They are as foundational to decentralized identity as a browser is to the web.
Besides helping you manage peer-to-peer relationships with others online, wallets hold verifiable credentials, the digital analog to the credentials and cards you carry in a physical wallet. One of the most important aspects of digital relationships is providing information about yourself to those you interact with. Sometimes that information can come from you—it's self-asserted—but many times the other party wants to reliably know what others say about you. For example, if you establish a banking relationship, the bank is legally obligated to verify things like your name and address independent of what you say. Decentralized identity wallets allow you to prove things about yourself using credentials others provide to you. At the same time, they protect your privacy by limiting the information disclosed and forgoing the need for the party you're interacting with to directly contact others to verify the information you provide.
In summary, decentralized identity systems allow you to create digital relationships with other parties independently, without relying on any other organization or service. These relationships are direct, private, and secure. They also provide the means for you to prove things about yourself inside these relationships so that even though you're operating at a distance, you and the other party can have confidence in the relationship's authenticity.
The preceding paragraphs say what decentralized identity is, and provide its benefits, but don't say how it works. Alan and others will likely want a few more details. Everything I describe below is handled by the wallet. The person using the wallet doesn't need to have any more knowledge of how they work than the operator of a browser needs to understand HTTP and HTML.
The foundation of a peer-to-peer, decentralized online relationship is an autonomic identifier like a peer DID. Identifiers are handles that someone else can use to identify someone or something else online. Peer DIDs can be created by a wallet at will, they're free, and they're self-certifying (i.e., there's no need for a third party). A relationship is created when two identity wallets create and exchange peer DIDs with each other on behalf of their owners. Peer DIDs allow the parties to the relationship to exchange private, secure messages.
There are four primary interaction patterns that wallets undertake when exchanging messages:
Verifiable credentials make heavy use of cryptography to provide not only security and privacy, but also confidence that the credential data is authentic. This confidence is based on four properties a properly designed credential presentation protocol provides:
The credential presentation can do all this while only disclosing the information needed for the interaction and without the verifier having to contact the credential issuer. Not having to contact the issuer ensures the credential can be used in situations with poor connectivity, that the issuer needn't be online, and preserves the credential subject's privacy about where the credential is being used.
A properly designed credential exchange protocol has four important properties:
These properties make a decentralized identity system self sovereign.
Decentralized identity systems are designed to provide people with control, security, and privacy while enhancing the confidence we have in our online relationships. Some time ago, I wrote the following. I think it's an apt way to close any discussion of decentralized identity because unless we keep our eyes on the goal, we'll likely take shortcuts in implementation that fail to live up to their promise.
Presently, people don't have operational relationships anywhere online.2 We have plenty of online relationships, but they are not operational because we are prevented from acting by their anemic natures. Our helplessness is the result of the power imbalance that is inherent in bureaucratic relationships. The solution to the anemic relationships created by administrative identity systems is to provide people with the tools they need to operationalize their self-sovereign authority and act as peers with others online. Peer-to-peer relationships are the norm in the physical world. When we dine at a restaurant or shop at a store in the physical world, we do not do so under the control of some administrative system. Rather, we act as embodied agents and operationalize our relationships, whether they be long-lived or nascent, by acting for ourselves. Any properly designed decentralized identity system must provide people with the tools they need to be "embodied" in the digital world and act autonomously.
Time and again, various people have tried to create decentralized marketplaces or social networks only to fail to gain traction. These systems fail because they are not based on a firm foundation that allows people to act in relationships with sovereign authority in systems mediated through protocol rather than by the whims of companies. We have a fine example of a protocol mediated system in the internet, but we've failed to take up the daunting task of building the same kind of system for identity. Consequently, when we act, we do so without firm footing or sufficient leverage.
Ironically, the internet broke down the walled gardens of CompuServe and Prodigy with a protocol-mediated metasystem, but surveillance capitalism has rebuilt them on the web. No one could live an effective life in an amusement park. Similarly, we cannot function as fully embodied agents in the digital sphere within the administrative systems of surveillance capitalists, despite their attractions. The emergence of self-sovereign identity, agreements on protocols, and the creation of metasystems to operationalize them promises a digital world where decentralized interactions create life-like online experiences. The richer relationships that result from properly designed decentralized identity systems promise an online future that gives people the opportunity to act for themselves as autonomous human beings and supports their dignity so that they can live an effective online life.
Photo Credit: Young Woman Using a Wallet from DALL-E (public domain) Prompt: draw a rectangular picture of a young woman using a wallet.
Tags: identity ssi decentralized+identity verifiable+credentials
Creating a personal oasis in the midst of our hectic lives is more than just a luxury;...
Welcome back, everyone, to a new episode of the Niche Pursuits News Podcast! Like every week, we’re here to talk about the latest SEO news for publishers, inspire you with some stories about our side hustles, and shock you with…
The post Runaway Parasite SEO! Google Penalizes Forbes! appeared first on Niche Pursuits.
The post How to Revitalize Your Blog Content When You Feel You’ve Covered It All appeared first on ProBlogger.
Maintaining Momentum in Blogging Series Have you ever found yourself staring at your blog, wondering what on earth to write about next? You might think you’ve explored every angle of your topic, leaving no stone unturned. If this sounds familiar, you’re not alone. Many bloggers encounter this challenge, especially after ...more
The post How to Revitalize Your Blog Content When You Feel You’ve Covered It All appeared first on ProBlogger.
The post How to Personalize Your Blog Like These 10 Top Bloggers appeared first on ProBlogger.
Lots of bloggers seem to do everything right, yet they don’t see much success. They write well-structured posts, they pay attention to SEO, they know the ins and outs of their blogging software … but something’s lacking. That missing “something” can often be personality. It’s the difference between a blog ...more
The post How to Personalize Your Blog Like These 10 Top Bloggers appeared first on ProBlogger.
The Department of Missions and Evangelism workshop, at the 53rd biennial Antiochian Archdiocese Convention in Miami, enjoyed the remarks on parish revitalization by His Grace, Bishop ANTHONY of the Diocese of Toledo and the Midwest.
Fr. John Whiteford uses the life of New Martyr Grand Duchess Elizabeth to encourage the listeners to live a life of perseverance in the faith. Nothing is won without struggle and sacrifice.
Grand Duchess Elizabeth was a grand-daughter of Queen Victoria of England and the older sister of the Empress Alexandra (July 4). After marrying Grand Duke Sergei she converted to the Orthodox faith, though this was not required by her position. After her husband was assassinated in 1905, she took monastic vows and withdrew from the world, founding the Convent of Saints Mary and Martha. There she served as superior, devoting her time to prayer, fasting, and caring for the sick and the poor. During the Russian Revolution, she was seized by the God-hating Bolsheviks and taken to the Urals, where she and several with her were martyred by being thrown alive down an abandoned mine-shaft. When the fall did not kill them, soldiers threw grenades down the shaft to complete their work. Saint Elizabeth was singing the Cherubic Hymn when she died. The Nun Barbara, her cell-attendant, voluntarily followed St Elizabeth into exile and received martyrdom with her. Their relics were recovered and taken at great risk to China, then to Jerusalem, where they were deposited in the Convent of St Mary Magdalene. When their reliquaries were opened in 1981, their bodies were found to be partly incorrupt, and gave off a sweet fragrance. Footnote: After the assassination of her husband in Moscow, Grand Duchess Elizabeth had a cross erected at the site of his death, bearing the inscription "Father, forgive them, for they know not what they do." After the revolution, the cross remained standing through the devotion of the people of Moscow to St Elizabeth, until it was personally torn down by Lenin.
Grand Duchess Elizabeth was a grand-daughter of Queen Victoria of England and the older sister of the Empress Alexandra (July 4). After marrying Grand Duke Sergei she converted to the Orthodox faith, though this was not required by her position. After her husband was assassinated in 1905, she took monastic vows and withdrew from the world, founding the Convent of Saints Mary and Martha. There she served as superior, devoting her time to prayer, fasting, and caring for the sick and the poor. During the Russian Revolution, she was seized by the God-hating Bolsheviks and taken to the Urals, where she and several with her were martyred by being thrown alive down an abandoned mine-shaft. When the fall did not kill them, soldiers threw grenades down the shaft to complete their work. Saint Elizabeth was singing the Cherubic Hymn when she died. The Nun Barbara, her cell-attendant, voluntarily followed St Elizabeth into exile and received martyrdom with her. Their relics were recovered and taken at great risk to China, then to Jerusalem, where they were deposited in the Convent of St Mary Magdalene. When their reliquaries were opened in 1981, their bodies were found to be partly incorrupt, and gave off a sweet fragrance. Footnote: After the assassination of her husband in Moscow, Grand Duchess Elizabeth had a cross erected at the site of his death, bearing the inscription "Father, forgive them, for they know not what they do." After the revolution, the cross remained standing through the devotion of the people of Moscow to St Elizabeth, until it was personally torn down by Lenin.
Fr. Adrian Budica interviews Pediatric Chaplain, Elizabeth Hawkins, BCC. Elizabeth is a Board Certified Chaplain and endorsed by the Greek Orthodox Archdiocese of America. (Part 1 of 2)
Fr. Adrian Budica continues his interview with Pediatric Chaplain, Elizabeth Hawkins, BCC. Elizabeth is a Board Certified Chaplain and endorsed by the Greek Orthodox Archdiocese of America. (Part 2 of 2)
The death of St. Elizabeth the Grand Duchess and New Martyr tells us about how she lived her life lived long before her martyrdom.
Today Fr. Anthony Perkins and Subdeacon and Evangelist Adam Roberts talk about the Western Rite and whether it is capable of becoming an organic expression of a uniquely American Orthodoxy. You can see the films that we talk about at orthodoxwest.com. Enjoy the show!
This conversation with Bill Black, OCMC Missionary to Kenya, was recorded during the International Orthodox Theological Association conference in Iasi, Romania (9-12 January 2019). Bill gave a talk on this subject at the conference and was gracious enough to take time away from the sessions to talk about it for the podcast. Enjoy the show!
Fr. Anthony continues his discussion with Fr. Robert Holet, author of "The First and Finest: Orthodox Christian Stewardship as Sacred Offering" about mission work, this time focusing on the need to organize and routinize the work of the parish intentionally and well (so that grace can grow). Enjoy the show!