Upon2020 (archive)
-
Phriend Phishing
Everybody knows about phishing these days: the attempt by an attacker to trick a victim into revealing information to them by masquerading as somebody else. For example, a site called examplé.com might attempt to pretend to be site example.com. It is often initiated by e-mail, whose sender address can be easily falsified, and often works…
-
What kind of organization is the right one for OpenID?
Let’s assume that the OpenID movement continues its dramatic growth for a few more years, and instead of a dozen technology vendors supporting it for hundreds of sites and a handful of use cases, as it is today, we’ll have hundreds of different implementations on tens or hundreds of thousands of sites, applying it to…
-
Identity Management: Winner-takes-all or not?
The Ping blog quotes Mike Neuenschwander of the Burton Group on whether there’s a winner-takes-all opportunity in identity management: “Although vendors continue to approach the IdM market as a winner-take-all proposition, features of IdM make the market extremely difficult to dominate. For one thing, the resources that identity vendors aspire to control are politically fragmented,…
-
Jeff Jonas: Discoverability: The First Information Sharing Principle
Jeff Jonas wrote a good piece that makes the both profound and obvious point that: … information must be registered … or it cannot be located in any efficient manner. He writes from the perspective of within the enterprise, and from the perspective of setting up a separate "catalog" of information. But this very idea…
-
Tim Berners-Lee thinks OpenID is a good thing
In a blog post here, he says, in the context of reputation: The way quality works on the web is through links … it works because reputable writers make links to things they consider reputable sources … One’s chosen starting page, and a nurtured set of bookmarks, are the entrance points, then, to a selected…