Skip to content
Kim Cameron's Identity Weblog

Kim Cameron's Identity Weblog

Digital Identity, Privacy, and the Internet's Missing Identity Layer

Read the Laws of Identity…

Or if you already know the science…

About this blog

  • Micro Biography
  • Email me
  • Privacy Policy

More Documents

  • Proposal for A Common Identity Framework (2008)
  • The Identity Metasystem (2006)
  • Microsoft Open Specification Promise
  • Wifi Positioning Systems: Beware of Unintended Consequences

Recent Presentations

  • The Laws of Identity on the Blockchain   — EIC Keynote May 2018.  The Laws of Identity, embedded in the GDPR, will drive the adoption of Decentralized Identity anchored by Blockchain The Laws of Identity on the Blockchain — EIC Keynote May 2018. The Laws of Identity, embedded in the GDPR, will drive the adoption of Decentralized Identity anchored by Blockchain

Categories

  • Anonymity
  • Application Development
  • Attacks
  • Bandit
  • Believe it or not
  • Biometrics
  • Blog
  • Business Model
  • Cardspace
  • CardSpace FAQ
  • Claims
  • Cloud
  • Code
  • Definitions
  • delegation
  • Digital Eternity
  • Digital Identity
  • Digital Rights
  • DigitalMe
  • Ethics
  • Events
  • Federation
  • Firefox
  • Fraud
  • hacking
  • Higgins
  • Human Interfaces
  • Identity
  • Identity Industry
  • Identity Management
  • Identity Metasystem
  • IdMaaS
  • infocard
  • Information Cards
  • Information Cards
  • Information loss
  • Intellectual Property
  • Law
  • Laws of Identity
  • Liberty
  • Linkage
  • Location
  • Metadirectory
  • Minimal Disclosure
  • Mobile
  • National Security
  • NO-SSL
  • OpenID
  • openinfocard
  • OSIS
  • PamelaWare
  • Phishing
  • Platforms
  • Podcast
  • Privacy
  • Privacy By Design
  • Research
  • Risk Management
  • Safari
  • SAML
  • Secure Payment
  • Shibboleth
  • Social Engineering
  • Spoofing
  • Strong authentication
  • sxip
  • U-Prove
  • Uncategorized
  • User centric
  • User control
  • Virtual Directory
  • Visual Studio
  • WAAD
  • Wifi
  • Windows Cardspace
  • WS-*
  • XMLDAP
  • XRI

Blogroll

  • 1 raindrop
  • AD Cookbook
  • Alex Barnett’s Blog
  • Andre Durand
  • Andy’s InfoCard Blog
  • Anti Phishing Working Group
  • Apache Trust Services Toolkit
  • Ash’s Identity Management
  • Between the Lines
  • Bill Barnes
  • Bob Blakley
  • cardcarrying
  • Carl’s Spam
  • Chris Ceppi
  • Christian Arnold
  • Craig Burton
  • Dale Olds’ VirtualSoul
  • Dave Kearns
  • David Goodman on Identity
  • Dick Hardt
  • Digital dialogs
  • Digital ID World
  • Doc Searls
  • Documentation
  • Don Box
  • Don Park’s Daily Habit
  • Drummond Reed
  • Emergent Chaos
  • Eric Norlin
  • Eternal Optimist
  • Federated Media
  • Feedback
  • FEIDE & SimpleSAML
  • Fourre-tout Numéro 1 (great site, in French)
  • Francis Shanahan
  • FutureSalon
  • Geek Feminism Blog
  • Hubert Le Van Gong
  • Ian Grigg
  • Ideal Government
  • Identity Woman
  • InfoSec Daily
  • IT Conversations
  • Jackson Shaw
  • James Governor
  • James Kobielus
  • Jamie Lewis
  • Jerry Fishenden’s Blog
  • Johannes Ernst
  • John Fontana
  • Julian Bond
  • Julian on Software
  • Kapil Sachdeva
  • Kim Cameron
  • Marc Canter
  • Martin Kuppinger
  • Matias Woloski
  • Matt Flynn’s Identity Management Blog
  • Michael Graves
  • Mike Shaver
  • My Blog of HR
  • My Son Max Cameron
  • On The Identity Trail
  • Open Legal Writing
  • Opinity Reputation Talk
  • P. T. Ong
  • Pamela Dingle’s Blog
  • panGloss
  • Pat Patterson
  • Pete Rowley
  • Phil Becker
  • Phil Windley
  • Planet Identity
  • Planet Security
  • Planetary.net
  • Plugins
  • Privacy and Identity Theft
  • Privacy International
  • Radovan Janecek
  • Raving Lunacy
  • Ray Corrigan
  • ReplaceGoogle
  • Robert Scoble
  • Robin Wilton
  • Scott C. Lemon
  • Simon Grice
  • Stefan Brands
  • Steve’s Identity Corner
  • Support Forums
  • Technorati Identity Page
  • The Hogg Blog
  • The Progress Bar
  • The Tao of XDI
  • Themes
  • Tiara.org
  • Toby Stevens
  • Twisted World
  • Usable Security
  • Vibro.net
  • Watching Them, Watching Us
  • Weaverluke
  • Web Services Contraptions
  • Zero Influence

Archives

  • August 2020
  • November 2018
  • October 2018
  • May 2018
  • July 2016
  • November 2015
  • November 2012
  • July 2012
  • June 2012
  • May 2012
  • February 2012
  • October 2011
  • August 2011
  • July 2011
  • June 2011
  • April 2011
  • March 2011
  • February 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004

Search Results for: fingerprint

Trusting Mobile Technology

Influential European ICT expert Jacques Bus on my posts about MAC addresses and their use by Google and Apple

Posted on July 11, 2010July 12, 2010Categories Digital Rights, Identity, Linkage, Wifi

“Microsoft Accuses Apple, Google of Attempted Privacy Murder”

Microsoft Identity Guru Accuses Apple, Google of trying to bury privacy alive

Posted on July 7, 2010July 7, 2010Categories Digital Identity, Identity, Laws of Identity, Linkage, Privacy, Wifi

Doing it right: Touch2Id

Privacy friendly “Proof-Of-Age” program is being expanded due to its initial success

Posted on July 3, 2010July 8, 2010Categories Biometrics, Digital Rights, Laws of Identity, Minimal Disclosure, Privacy, Strong authentication1 Comment on Doing it right: Touch2Id

Microsoft identity guru questions Apple, Google on mobile privacy

The current abuse of personal device identifiers by Google and Apple is at least as significant as the problems I discussed long ago with Passport

Posted on July 3, 2010Categories Ethics, Identity, Laws of Identity, Linkage, Privacy, Wifi

Update to iTunes comes with privacy fibs

As the personal phone evolves it will become increasingly obvious that groups within some of our best tech companies have built businesses based on consciously crafted privacy fibs.

Posted on July 2, 2010July 2, 2010Categories Digital Rights, Ethics, Identity, Linkage, Privacy, Wifi

What Could Google Do With the Data It's Collected?

Google should change its FAQs about WiFi data collection to line up with what its PR people are telling journalists.

Posted on June 28, 2010June 28, 2010Categories Blog, Ethics, Linkage, Minimal Disclosure, Privacy, Wifi2 Comments on What Could Google Do With the Data It's Collected?

Sorry Tomek, but I “win”

These results are sad and staggering

Posted on February 17, 2010February 17, 2010Categories Digital Identity, Digital Rights, Ethics, Linkage, Minimal Disclosure, Privacy, Research

More unintended consequences of browser leakage

Another example of digital fingerprinting – this time leveraging social networks to produce unique, real-world identification without the user's knowledge

Posted on February 4, 2010February 4, 2010Categories Anonymity, Attacks, Digital Identity, Digital Rights, Ethics, Linkage, Privacy, Research

Minimal disclosure for browsers

The EFF research could help the industry evolve browsers to follow minimal disclosure principles

Posted on January 28, 2010Categories Anonymity, Linkage, Privacy

New EFF Research on Web Browser Tracking

How much should browsers reveal to untrusted sites?

Posted on January 28, 2010January 28, 2010Categories Anonymity, Digital Rights, Linkage, Privacy, Research

Posts navigation

Previous page Page 1 Page 2 Page 3 … Page 6 Next page
Proudly powered by WordPress