Separating apples from oranges
To offer reasonable protection, InfoCards require a client component and so does OpenID…
To offer reasonable protection, InfoCards require a client component and so does OpenID…
Could all the interest in new identity technology lead to security breaches worse than those that currently occur, bringing about a further demoralization of the user?
What have personal computers been about since the get-go? Haven't they always seemed ambitious?
I don't think I know anyone so full of positive energy – and he wears it close to the surface too – where it belongs.
What if – in the midst of the redirection – users are redirected to a wolf-in-sheep's-clothing?
Whobar is written in PHP, but works like a proxy, so that the web application can be in any language.
Pete argues that to make the identity metasystem a reality it must come from multiple vendors, it must be ubiquitous, and it must be in the DNA of the platform…
Norlin's maxim is simple: The internet inexorably pulls information from the private domain into the public domain.
Infrared photo technology will soon migrate into the private sector, and morph into a tool for tracking individual motorists’ movements, says former policeman Andy Bucholz.
Marc says we need LOTS of vendors to participate and the big boys – too.