{"id":311,"date":"2005-10-05T08:20:45","date_gmt":"2005-10-05T16:20:45","guid":{"rendered":"http:\/\/netmesh.info\/jernst\/uncategorized\/jon-udell-says-its-hard-to-envision-digital-identity-scenarios"},"modified":"2005-10-05T08:20:45","modified_gmt":"2005-10-05T16:20:45","slug":"jon-udell-says-its-hard-to-envision-digital-identity-scenarios","status":"publish","type":"post","link":"https:\/\/upon2020.com\/blog\/2005\/10\/jon-udell-says-its-hard-to-envision-digital-identity-scenarios\/","title":{"rendered":"Jon Udell says it&#8217;s hard to envision digital identity scenarios"},"content":{"rendered":"<p><a href=\"http:\/\/weblog.infoworld.com\/udell\/2005\/10\/05.html#a1315\" target=\"_blank\">He says<\/a>:<\/p>\n<blockquote><p> Even a tech-savvy person like me has a hard time envisioning, never mind comparing, the interaction scenarios proposed by various identity schemes <\/p><\/blockquote>\n<p>I completely agree, and would add that nobody, not even the &#8220;insiders&#8221; really understand what consequences all the different proposed architectures have in terms of, say,<\/p>\n<ul>\n<li>who gets empowered and whose power diminishes<\/li>\n<li>how the attack vectors on those different architectures differ<\/li>\n<li>what governance structures are needed once any of this becomes a mass-market technology<\/li>\n<li>and so forth.<\/li>\n<\/ul>\n<p>Which is why I think the <a href=\"http:\/\/www.eclab.byu.edu\/workshops\/iiw2005\/announcement.html\" target=\"_blank\">Internet Identity Workshop<\/a> put together by Kaliya Hamlin, Drummond Reed, Doc Searls and Phil Windley is such a good idea. If we all do our part, some real insights will come out of this workshop.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>He says: Even a tech-savvy person like me has a hard time envisioning, never mind comparing, the interaction scenarios proposed by various identity schemes I completely agree, and would add that nobody, not even the &#8220;insiders&#8221; really understand what consequences all the different proposed architectures have in terms of, say, who gets empowered and whose&hellip;<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"webmentions_disabled":false,"footnotes":""},"categories":[59],"tags":[],"class_list":["post-311","post","type-post","status-publish","format-standard","hentry","category-comments","kind-"],"kind":false,"_links":{"self":[{"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/posts\/311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":0,"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"wp:attachment":[{"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/upon2020.com\/blog\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}