{"id":303,"date":"2004-12-08T03:25:40","date_gmt":"2004-12-08T03:25:40","guid":{"rendered":"\/?p=303"},"modified":"2012-11-01T14:00:34","modified_gmt":"2012-11-01T14:00:34","slug":"interview-with-mike-foley-on-bluetooth","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=303","title":{"rendered":"Interview with Mike Foley on Bluetooth"},"content":{"rendered":"<h5>To help me frame the Laws of Identity in a practical way, I took on a scenario presented to me by Eric Norlin and <a href=\"https:\/\/www.identityblog.com\/2004\/11\/16.html\" class=\"broken_link\">began to drill into it<\/a> to expose the technology issues it presented in terms of identity. Part of this scenario involved using a bluetooth connection between a Polycomm and a Bluetooth phone.<\/h5>\n<p>I knew virtually nothing about Bluetooth at that point, and so had to learn. I studied the Bluetooth web site, and then approached Noel Anderson, a Program Manager in Networking at Microsoft. He was kind enough to give me an introductory tutorial about Bluetooth identity issues which I recorded as an <strong><a href=\"http:\/\/www.elusivefresh.com\/bluetooth-noel.mp3\">Identity Interview with Noel Anderson<\/a><\/strong>. I found Noel fascinating, and Craig Burton thought our discussion was interesting enough to <a href=\"http:\/\/www.craigburton.com\/\">transcribe some of it:<\/a> In particular, I thought Noel&amp;#39s example of an &#8220;identity bomb&#8221; taught us a lot about the underlying technology issues:<\/p>\n<blockquote style=\"margin-right: 0px;\" dir=\"ltr\"><p><em>When we were writing the paper we wanted to catch attention so we came up with the idea of the Bluetooth bomb. Every Bluetooth device has a 48\u2014bit unique ID number, which is possible to either query for directly or in a broadcast mode. So we came up with the concept of a low power Bluetooth device which was attached to a weapon that was querying for a particular device ID so that when the target cell phone or PDA or another Bluetooth device came into range it would activate the [bomb] device.<\/em><\/p><\/blockquote>\n<p dir=\"ltr\">Noel told me that things were being done to fix the protocols. But I was initially more interested in Bluetooth <strong>as an example of how privacy issues affect identity,<\/strong> and didn&amp;#39t immediately tune into the details of the fixes.<\/p>\n<p dir=\"ltr\">Then <strong>Mike Foley<\/strong>, who is the organizer of the special interest group that is fixing these problems, contacted me. I offered to<a href=\"https:\/\/www.identityblog.com\/interviews\/MikeFoley.mp3\" class=\"broken_link\"> interview him<\/a> so everyone could learn about what his organization was doing. As he began to tell me about the work that is going on to fix the identity problems, I was not only relieved, but <em>amazed at how the fixes themselves demonstrated the dynamics of the Laws of Identity hard at work<\/em>. Bluetooth having been out of conformance with the Laws, concerns about the marketplace motivated its technologists to <strong>fix the technology<\/strong>.<\/p>\n<p dir=\"ltr\">When Mike talks about the water that has flowed under the bridge of privacy since Bluetooth was first envisaged in the late 1990s, you really get a feeling for how there are objective factors shaping the emergence of identity technology. And his discussion of how identifiers work (in conjunction with what we learned from Noel) teaches us a lot about the relationship between identifiers and privacy.<\/p>\n<p dir=\"ltr\">So here&amp;#39s the <a href=\"https:\/\/www.identityblog.com\/interviews\/MikeFoley.mp3\" class=\"broken_link\">Identity Interview with Mike Foley<\/a> as an mp3 (22 minutes). It&amp;#39s really fun when we are talking about the Fourth Law of Identity&#8230; Mike also invites those of us who are serious about identity to join the SIG.<\/p>\n<p dir=\"ltr\">By the way, I plan to publish a series of Identity Interviews to accompany the blog, so this will become a regular feature.<\/p>\n<p dir=\"ltr\">\n","protected":false},"excerpt":{"rendered":"<p>To help me frame the Laws of Identity in a practical way, I took on a scenario presented to me by Eric Norlin and began to drill into it to expose the technology issues it presented in terms of identity. Part of this scenario involved using a bluetooth connection between a Polycomm and a Bluetooth &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=303\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Interview with Mike Foley on Bluetooth<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,2,1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/303"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=303"}],"version-history":[{"count":1,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/303\/revisions"}],"predecessor-version":[{"id":1259,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/303\/revisions\/1259"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}