{"id":985,"date":"2008-05-15T15:27:27","date_gmt":"2008-05-15T23:27:27","guid":{"rendered":"\/?p=985"},"modified":"2008-05-15T15:29:44","modified_gmt":"2008-05-15T23:29:44","slug":"internet-as-extension-of-mind","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=985","title":{"rendered":"Internet as extension of mind"},"content":{"rendered":"<p><a modo=\"false\" target=\"_blank\" href=\"http:\/\/xri.net\/=rj\" class=\"broken_link\">Ryan Janssen<\/a>\u00a0at <em><a href=\"http:\/\/www.drstarcat.com\">drstarcat.com<\/a><\/em>\u00a0\u00a0published <a href=\"http:\/\/drstarcat.com\/archives\/52\">an interview\u00a0<\/a>recently that led me to think back over the various phases of my work on identity.\u00a0\u00a0I generally fear boring people with the details, but Ryan\u00a0explored some things that are very important to me, and I appreciate it.\u00a0<\/p>\n<p>After talking about some of the identity problems of the enterprise, he puts forward a\u00a0description of\u00a0metadirectory that I found interesting because\u00a0it\u00a0starts from current\u00a0concepts like claims rather than the vocabulary of X.500:\u00a0<\/p>\n<blockquote><p>&#8230;. Kim and the\u00a0ZOOMIT team came up with the concept of a \u201cmetadirectory\u201d. Metadirectory software essentially tries to find correlation handles (like a name or email) across the many heterogeneous software environments in an enterprise, so network admins can determine who has access to what. Once this is done, it then takes the heterogeneous claims and transforms them into a kind of claim the metadirectory can understand. The network admin can then use the metadirectory to assign and remove access from a single place.\u00a0<\/p>\n<p>Zoomit released their commercial metadirectory software (called \u201cVIA&#8221;) in 1996 and proceeded to clean the clock of larger competitors like IBM for the next few years until Microsoft acquired the company in the summer of 1999. Now anyone who is currently involved in the modern identity movement and the issues of \u201cdata portability\u201d that surround it has to be feeling a sense of deja vu because these are EXACTLY the same problems that we are now trying to solve on the internet\u2014only THIS time we are trying to take control of our OWN claims that are spread across innumerable heterogeneous systems that have no way to communicate with each other. Kim\u2019s been working on this problem for SIXTEEN years\u2014take note!<\/p><\/blockquote>\n<p>Yikes.\u00a0 Time flies when you&#39;re having fun.<\/p>\n<blockquote><p>When I asked Kim what his single biggest realization about Identity in the 16 years since he started working on it was, he was slow to answer, but definitive when he did\u2014privacy. You see, Kim is a philosopher as well as a technologist. He sees information technology (and the Internet in particular) as a social extension of the human mind. He also understands that the decisions we make as technologists have unintended as well as intended consequences. Now creating technology that enables a network administrator to understand who we are across all of a company\u2019s systems is one thing, but creating technology that allows someone to understand who we are across the internet, particularly as more and more of who we are as humans is stored there, and particularly if that someone isn\u2019t US or someone we WANT to have that complete view, is an entirely other problem.<\/p>\n<p>Kim has consistently been one the strongest advocates for obscuring ANY correlation handles that would allow ANY Identity Provider or Relying Party to have a more complete view of us than we explicitly give them. Some have criticized his concerns as overly cautious in a world where \u201cprivacy is dead\u201d. When you think of your virtual self as an extension of your personal self though, and you realize that the line between the two is becoming increasingly obscured, you realize that if we lose privacy on the internet, we, in a very real sense, lose something that is essentially human. I\u2019m not talking about the ability to hide our pasts or to pretend to be something we\u2019re not (though we certainly will lose that). What we lose is that private space that makes each of us unique. It\u2019s the space where we create. It\u2019s the space that continues to ensure that we don\u2019t all collapse into one.<\/p><\/blockquote>\n<p>Yes, it is the space on which and through which Civilization\u00a0has been\u00a0built.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protecting the private space that makes each of us unique&#8230;<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,2,58,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/985"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=985"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/985\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}