{"id":832,"date":"2007-07-05T19:55:32","date_gmt":"2007-07-06T03:55:32","guid":{"rendered":"\/?p=832"},"modified":"2007-07-27T09:48:32","modified_gmt":"2007-07-27T17:48:32","slug":"paul-madsen-leaks-internal-photo","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=832","title":{"rendered":"Paul Madsen leaks internal photo"},"content":{"rendered":"<p>Despite my repeated&nbsp;requests not to go there, Paul Madsen&nbsp;of ConnectID <a href=\"http:\/\/connectid.blogspot.com\/2007\/07\/ford-would-be-proud.html\">has&nbsp;published <\/a>a leaked, top secret, internal Microsoft Identity and Access&nbsp;photo.&nbsp; His post reads as follows:<\/p>\n<blockquote>\n<p class=\"post-body\">An un-named source in Redmond sent me this never before seen picture of the first ever infocards assembly line.<\/p>\n<p><a href=\"http:\/\/history.grand-forks.k12.nd.us\/NDhistory\/LessonImages\/Sources\/Pictures\/assembly%20line.jpg\" class=\"broken_link\"><img border=\"0\" src=\"\/wp-content\/images\/2007\/07\/assembly.jpg\" style=\"display: block; margin: 0px auto 10px; cursor: hand; text-align: center\" \/><\/a><br \/>\nIn the front you can see a worker inserting secret keys obtained from the bins below (the <a href=\"http:\/\/www.columbia.edu\/acis\/history\/cards.html\" class=\"broken_link\"><font color=\"#6699cc\">punch-card<\/font><\/a> calculating machines on which those keys were generated are in another room). Other workers further down the line can be seen inserting attributes before securing the top of the cards with wrenches.<\/p>\n<p>My source tells me that another line is planned.<\/p><\/blockquote>\n<p>Luckily,&nbsp;the IP revealed by this photo is part of the <a href=\"\/?p=574\">Open Specification Promise (OSP)<\/a>.&nbsp;&nbsp;I&nbsp;checked with our operations people to see if the items in the bin&nbsp;&nbsp;really are the secret keys,&nbsp;but&nbsp;apparently they are&nbsp;silver bullets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Other workers further down the line can be seen inserting attributes before securing the top of the cards with wrenches.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[8,7,18,38,4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/832"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=832"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/832\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}