{"id":540,"date":"2006-08-20T18:31:36","date_gmt":"2006-08-21T02:31:36","guid":{"rendered":"\/?p=540"},"modified":"2006-08-20T18:32:42","modified_gmt":"2006-08-21T02:32:42","slug":"issues-raised-by-knowledge-verification","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=540","title":{"rendered":"Issues raised by Knowledge Verification"},"content":{"rendered":"<p>Adam at <a href=\"http:\/\/www.emergentchaos.com\/\">Emergent Chaos<\/a>&nbsp;outlines several issues he thinks arise from IDology&#39;s approach to <a href=\"\/?p=538\">Knowledge Verification<\/a>:&nbsp;<\/p>\n<blockquote><p>I don\u00e2\u20ac\u2122t like these types of systems for three reasons:<\/p>\n<p>First, they are non-consensual for the consumer. Companies such as IDology make deals with other companies, such as my bank, and then I\u00e2\u20ac\u2122m forced to use the system.<\/p>\n<p>Second, the information that such companies can gather are probably already being gathered by Choicepoint, Axciom, Google, and others. So the assertions that \u00e2\u20ac\u0153its cheap for us, and expensive for the attackers\u00e2\u20ac\u009d are hard to accept as credible.<\/p>\n<p>Third, if truth and your database don\u00e2\u20ac\u2122t agree, then we\u00e2\u20ac\u2122re forced to have a reconciliation process, in which I, or the id thief, convince the company to change its answers. How does that process work?<\/p><\/blockquote>\n<p>I hope John at IDology can respond at the same time he gives us concrete examples of how the system works in practice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is Knowledge Verification consensual or not?<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,11,5],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/540"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=540"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/540\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}