{"id":272,"date":"2005-01-11T20:47:07","date_gmt":"2005-01-11T20:47:07","guid":{"rendered":"\/?p=272"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T04:00:00","slug":"interesting-times","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=272","title":{"rendered":"Interesting times"},"content":{"rendered":"<p>Last week I mentioned that I had some great links to tell you about.  Guess what?  That rotten <a href=\"http:\/\/www.burtongroupblogs.com\/jamielewis\/\" class=\"broken_link\">Jamie Lewis<\/a> has scooped me and with some great postings.<\/p>\n<p>First, there is LID.  As Jamie <a href=\"http:\/\/www.burtongroupblogs.com\/jamielewis\/2005\/01\/put_a_lid_on_it.html\" class=\"broken_link\">puts it:<\/a><\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>The Lightweight IDentity (LID) spec joins <a href=\"http:\/\/www.sxip.com\/\" class=\"broken_link\"><font color=#5891d1>SxIP<\/font><\/a> and <a href=\"http:\/\/xrixdi.idcommons.net\/\" class=\"broken_link\"><font color=#5891d1>XRI\/XDI<\/font><\/a> in attempting to create systems that empower individuals to manage their digital identity. It uses URLs to point to identity information. It&#39;s an update of sorts of the vCard concept and allows users to publish (self-assert) identity info.<\/p>\n<p>According to <a href=\"http:\/\/lid.netmesh.org\/\"><font color=#5891d1>the LID site<\/font><\/a>,<span class=lid> LID<\/span> is built on: <\/p>\n<ul>\n<li><a href=\"http:\/\/www.ietf.org\/rfc\/rfc2426.txt\" target=_blank><font color=#5891d1>VCards<\/font><\/a> (actually the <a href=\"http:\/\/www.jabber.org\/jeps\/jep-0054.html\" target=\"_blank\" class=\"broken_link\"><font color=#5891d1>XML version of VCards<\/font><\/a> currently maintained by the <a href=\"http:\/\/www.jabber.org\/\" target=blank><font color=#5891d1>Jabber Software Foundation<\/font><\/a>) for information about yourself;\n<li><a href=\"http:\/\/www.foaf-project.org\/\" target=\"_blank\" class=\"broken_link\"><font color=#5891d1>FOAF<\/font><\/a> (friend-of-a-friend) for information about your social network;\n<li><a href=\"http:\/\/www.w3.org\/TR\/xpath\" target=\"_blank\" class=\"broken_link\"><font color=#5891d1>XPath<\/font><\/a> to select which information to query, and which information is published to whom.\n<li><a href=\"http:\/\/www.gnupg.org\/\" target=_blank><font color=#5891d1>Gnu Privacy Guard (GPG)<\/font><\/a> for digital signatures. <\/li>\n<\/ul>\n<\/blockquote>\n<p dir=ltr>He also points out that:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>Johnannes Ernst has a <a href=\"http:\/\/netmesh.info\/jernst\"><font color=#999999>blog<\/font><\/a> where he talks about how LID conforms to Kim Cameron&#39;s <a href=\"https:\/\/www.identityblog.com\/stories\/2004\/12\/09\/thelaws.html\" class=\"broken_link\"><font color=#999999>laws of identity<\/font><\/a> (more later &#8211; Kim).<\/p>\n<\/blockquote>\n<p dir=ltr>Jamie then goes into considerably more depth <a href=\"http:\/\/www.burtongroupblogs.com\/jamielewis\/2005\/01\/more_on_lid.html\" class=\"broken_link\">here<\/a>.  He also points to an article by <a href=\"http:\/\/weblog.burningbird.net\/archives\/2005\/01\/10\/your-digital-self\/\">Shelley Powers<\/a> which has to be the first concrete descrip<img onmouseover=this.style.top=-25 title=\"Remove Indent\" style=\"LEFT: -193px; POSITION: absolute; TOP: 0px\" onclick=\"format('outdent');this.style.top=0\" onmouseout=this.style.top=0 height=50 src=\"http:\/\/127.0.0.1:5335\/system\/images\/toolbars\/htmlEditor.gif\" width=290 border=0>tion of using the emerging identity systems &#8211; she concentrates on LID and SXIP, with some mentions of I-names and Liberty.  I love stuff like this &#8211; and hope there will be a lot more of it.  Shelley has a lot of energy going here.  So I want to forgive her if there is a certain &#8220;biff! boom! bah!&#8221; in her punch &#8211; like when she lands one on me.  <\/p>\n<p dir=ltr>She&#39;s a &#8216;bit rough&#8217; on Liberty, which after all has done pioneering work which all of us would like to see expressed in the emerging &#8220;mega meta momma backplane&#8221;.  But I have to admit I was also taken aback when I first read the scenario doc she describes:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>Case in point, from the <a href=\"http:\/\/www.projectliberty.org\/resources\/specifications.php#box1\" class=\"broken_link\">specification<\/a> there is a possible user scenario, with Joe Self logging on to an airline, who is part of a <em>circle of trust<\/em>. Once authenticated, in the scenario, Joe is then asked:<\/p>\n<blockquote>\n<p><i><\/p>\n<p>Note: You may federate your Airlines, Inc. identity with any other identities you may have with members of our affinity group. <\/p>\n<p>Do you consent to such introductions?<br \/><\/i><\/p>\n<\/blockquote>\n<p>Laughable. I chortled until tears ran down my face. It then continued on from there, with Joe Self being asked to &#145;federate his identity&#146; at various sites within the &#145;afinity group&#146; as he progressed along, just trying to reserve an airline ticket and rent a car &#150; something that can be done in one move, with one click of the button in today&#146;s travel systems. <\/p>\n<\/blockquote>\n<p dir=ltr>I think we all know the authors must have meant this as a placeholder &#8211; meaning &#8220;more research to be done on user metaphor&#8221;.  But I was wincing when I first read it too &#8211; only because I know how difficult these issues are.  Anyway, I&#39;ll be getting to the issues at play here when I present my 6th law. <\/p>\n<p dir=ltr>Finally there is Shelley&#39;s comment on my work on this blog:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p dir=ltr>I never touch &#8216;Laws&#8217; as defined by a person or persons with vested interest, regardless of how good they sound.<\/p>\n<\/blockquote>\n<p dir=ltr>Fair enough.  But I can&#39;t imagine anyone who doesn&#39;t have some vested interest in what they do.  Unconscious motivations are the worst &#8211; because you can&#39;t take them into account or compensate for them. <\/p>\n<p dir=ltr>I do believe the laws we are discussing here operate equally in everyone&#39;s interest.  They lead us all toward the <strong>identity big bang &#8211; a new era of software which is identity-aware<\/strong>.  Sure, Microsoft will benefit from that big-time.  But so will every thinker, inventor, developer and citizen on the planet, and all the companies, universities and governments with whom they are associated.<\/p>\n<p dir=ltr>\n","protected":false},"excerpt":{"rendered":"<p>Last week I mentioned that I had some great links to tell you about. Guess what? That rotten Jamie Lewis has scooped me and with some great postings. First, there is LID. As Jamie puts it: The Lightweight IDentity (LID) spec joins SxIP and XRI\/XDI in attempting to create systems that empower individuals to manage &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=272\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Interesting times<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/272"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=272"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/272\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}