Skip to content
Kim Cameron's Identity Weblog

Kim Cameron's Identity Weblog

Digital Identity, Privacy, and the Internet's Missing Identity Layer

Read the Laws of Identity…

Or if you already know the science…

About this blog

  • Micro Biography
  • Email me
  • Privacy Policy

More Documents

  • Proposal for A Common Identity Framework (2008)
  • The Identity Metasystem (2006)
  • Microsoft Open Specification Promise
  • Wifi Positioning Systems: Beware of Unintended Consequences

Recent Presentations

  • The Laws of Identity on the Blockchain   — EIC Keynote May 2018.  The Laws of Identity, embedded in the GDPR, will drive the adoption of Decentralized Identity anchored by Blockchain The Laws of Identity on the Blockchain — EIC Keynote May 2018. The Laws of Identity, embedded in the GDPR, will drive the adoption of Decentralized Identity anchored by Blockchain

Categories

  • Anonymity
  • Application Development
  • Attacks
  • Bandit
  • Believe it or not
  • Biometrics
  • Blog
  • Business Model
  • Cardspace
  • CardSpace FAQ
  • Claims
  • Cloud
  • Code
  • Definitions
  • delegation
  • Digital Eternity
  • Digital Identity
  • Digital Rights
  • DigitalMe
  • Ethics
  • Events
  • Federation
  • Firefox
  • Fraud
  • hacking
  • Higgins
  • Human Interfaces
  • Identity
  • Identity Industry
  • Identity Management
  • Identity Metasystem
  • IdMaaS
  • infocard
  • Information Cards
  • Information Cards
  • Information loss
  • Intellectual Property
  • Law
  • Laws of Identity
  • Liberty
  • Linkage
  • Location
  • Metadirectory
  • Minimal Disclosure
  • Mobile
  • National Security
  • NO-SSL
  • OpenID
  • openinfocard
  • OSIS
  • PamelaWare
  • Phishing
  • Platforms
  • Podcast
  • Privacy
  • Privacy By Design
  • Research
  • Risk Management
  • Safari
  • SAML
  • Secure Payment
  • Shibboleth
  • Social Engineering
  • Spoofing
  • Strong authentication
  • sxip
  • U-Prove
  • Uncategorized
  • User centric
  • User control
  • Virtual Directory
  • Visual Studio
  • WAAD
  • Wifi
  • Windows Cardspace
  • WS-*
  • XMLDAP
  • XRI

Blogroll

  • 1 raindrop
  • AD Cookbook
  • Alex Barnett’s Blog
  • Andre Durand
  • Andy’s InfoCard Blog
  • Anti Phishing Working Group
  • Apache Trust Services Toolkit
  • Ash’s Identity Management
  • Between the Lines
  • Bill Barnes
  • Bob Blakley
  • cardcarrying
  • Carl’s Spam
  • Chris Ceppi
  • Christian Arnold
  • Craig Burton
  • Dale Olds’ VirtualSoul
  • Dave Kearns
  • David Goodman on Identity
  • Dick Hardt
  • Digital dialogs
  • Digital ID World
  • Doc Searls
  • Documentation
  • Don Box
  • Don Park’s Daily Habit
  • Drummond Reed
  • Emergent Chaos
  • Eric Norlin
  • Eternal Optimist
  • Federated Media
  • Feedback
  • FEIDE & SimpleSAML
  • Fourre-tout Numéro 1 (great site, in French)
  • Francis Shanahan
  • FutureSalon
  • Geek Feminism Blog
  • Hubert Le Van Gong
  • Ian Grigg
  • Ideal Government
  • Identity Woman
  • InfoSec Daily
  • IT Conversations
  • Jackson Shaw
  • James Governor
  • James Kobielus
  • Jamie Lewis
  • Jerry Fishenden’s Blog
  • Johannes Ernst
  • John Fontana
  • Julian Bond
  • Julian on Software
  • Kapil Sachdeva
  • Kim Cameron
  • Marc Canter
  • Martin Kuppinger
  • Matias Woloski
  • Matt Flynn’s Identity Management Blog
  • Michael Graves
  • Mike Shaver
  • My Blog of HR
  • My Son Max Cameron
  • On The Identity Trail
  • Open Legal Writing
  • Opinity Reputation Talk
  • P. T. Ong
  • Pamela Dingle’s Blog
  • panGloss
  • Pat Patterson
  • Pete Rowley
  • Phil Becker
  • Phil Windley
  • Planet Identity
  • Planet Security
  • Planetary.net
  • Plugins
  • Privacy and Identity Theft
  • Privacy International
  • Radovan Janecek
  • Raving Lunacy
  • Ray Corrigan
  • ReplaceGoogle
  • Robert Scoble
  • Robin Wilton
  • Scott C. Lemon
  • Simon Grice
  • Stefan Brands
  • Steve’s Identity Corner
  • Support Forums
  • Technorati Identity Page
  • The Hogg Blog
  • The Progress Bar
  • The Tao of XDI
  • Themes
  • Tiara.org
  • Toby Stevens
  • Twisted World
  • Usable Security
  • Vibro.net
  • Watching Them, Watching Us
  • Weaverluke
  • Web Services Contraptions
  • Zero Influence

Archives

  • August 2020
  • November 2018
  • October 2018
  • May 2018
  • July 2016
  • November 2015
  • November 2012
  • July 2012
  • June 2012
  • May 2012
  • February 2012
  • October 2011
  • August 2011
  • July 2011
  • June 2011
  • April 2011
  • March 2011
  • February 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004

Search Results for: google ssid

Microsoft identity guru questions Apple, Google on mobile privacy

The current abuse of personal device identifiers by Google and Apple is at least as significant as the problems I discussed long ago with Passport

Posted on July 3, 2010Categories Ethics, Identity, Laws of Identity, Linkage, Privacy, Wifi

What Could Google Do With the Data It's Collected?

Google should change its FAQs about WiFi data collection to line up with what its PR people are telling journalists.

Posted on June 28, 2010June 28, 2010Categories Blog, Ethics, Linkage, Minimal Disclosure, Privacy, Wifi2 Comments on What Could Google Do With the Data It's Collected?

Rethink things in light of Google's Gstumbler report

The report indicates Google has been purposely collecting a lot of information its defenders couldn't have imagined.

Posted on June 11, 2010June 19, 2010Categories Digital Identity, Laws of Identity, Linkage, Minimal Disclosure, Privacy, Wifi

Are SSIDs and MAC addresses like house numbers?

Do people consciously try to advertise their SSIDs and MAC addresses to the world by running to the store, buying them, and nailing them to their metaphorical porches?

Posted on June 5, 2010June 19, 2010Categories Definitions, Digital Identity, Digital Rights, Laws of Identity, Linkage, Wifi1 Comment on Are SSIDs and MAC addresses like house numbers?

EPIC on Google WiFi eavesdropping

Prominent privacy watchdog EPIC complains to FCC about improper use of device identifiers.

Posted on May 28, 2010June 19, 2010Categories Digital Rights, Ethics, Identity, Laws of Identity, Privacy, Wifi

The Laws of Identity smack Google

The idea that Google would, without our consent, employ our home networks for its own commercial purposes betrays a problem of ethics and a lack of control.

Posted on May 27, 2010June 19, 2010Categories Ethics, Laws of Identity, Linkage, Privacy, Wifi

Identity Management As A Service

Identity Management and the way it is delivered are changing dramatically

Posted on May 23, 2012November 8, 2012Categories Digital Identity, Identity, Identity Management, IdMaaS4 Comments on Identity Management As A Service

Trusting Mobile Technology

Influential European ICT expert Jacques Bus on my posts about MAC addresses and their use by Google and Apple

Posted on July 11, 2010July 12, 2010Categories Digital Rights, Identity, Linkage, Wifi

Harvesting phone and laptop fingerprints for its database

Google says the user’s device sends a request to its location server with a list of all MAC addresses currently visible to it. Does that include yours?

Posted on June 20, 2010June 20, 2010Categories Laws of Identity, Linkage, Privacy, Wifi

What does a MAC address tell you?

Mapping the attendees at a conference to home addresses even when they’ve never consented to any such tracking is not going to be hard if you’ve gone to the trouble of scanning every street in every city in the country.

Posted on June 17, 2010June 19, 2010Categories Digital Rights, Laws of Identity, Linkage, Privacy, Wifi1 Comment on What does a MAC address tell you?

Posts navigation

Page 1 Page 2 Page 3 Next page
Proudly powered by WordPress