- Aug 2020
-
www.windley.com www.windley.com
-
Sovereignty defines the source of our authority to act
This is a key idea that is lost in most identity discussions. Every administrative ID system has authority to act within their own domain. But by what authority are people acting? By their own authority.
-
- Aug 2019
-
www.windley.com www.windley.com
-
transparent and auditable
Specifically, the IT it is transparent and auditable to Target.
-
- Dec 2018
-
www.windley.com www.windley.com
-
Market incentives
Michael Elling does a good job of exploring this in telecom terms in Forget Net Neutrality; Equilibrism Is The Answer
-
- Jun 2018
-
www.windley.com www.windley.com
-
Elections have consequences and the ability to influence an election is enticing to those who have a stake in the outcome of an election.
Since I wrote this, we've seen that state actors are willing to spend large amounts to influence elections.
-
- May 2018
-
www.windley.com www.windley.com
-
rise of tokens is a recent development that promises to change this
For an in-depth look at this, see Introducing the Convergence Ecosystem from Outlier Ventures.
-
- Apr 2018
-
www.windley.com www.windley.com
-
within which the sovereign has complete control and outside of which the sovereign relates to others within established rules and norms
By way of example, the same action might be a police action within a nation's border or an act or war without.
-
- Mar 2018
-
robertknight.me.uk robertknight.me.uk
-
encrypt a subset of files in a Git repository such that only specific collaborators can decrypt them
This is great. I had no idea. Thanks for pointing this out.
-
- Nov 2017
-
www.windley.com www.windley.com
-
While we often speak of privacy, we don't often link it to control. Privacy protects control and control protects privacy.
This is a point about sovereignty that is often overlooked.
-
- Sep 2017
-
www.windley.com www.windley.com
-
Privacy protects control and control protects privacy.
Privacy and control are two sides of the same coin.
-
- Aug 2017
-
www.windley.com www.windley.com
-
For people, the lack of trust in social login might be from fear of identity correlation, fear of what data will be shared, or lack of trust in the security of the social login platform. For relying parties, the lack of trust may result from the perception that the identity provider performs insufficient identity proofing or the fear of outsourcing a critical security function (user authentication) to a third party. An additional concern is allowing a third party of have administrative authority for the relying party's users—not being in control of a critical piece of infrastructure. That is, they don't trust that the rules of the game might change arbitrarily based on the fluctuating business demands of the identity provider.3
Why social login is not seen as legitimate by some users and relying parties.
-
- Jul 2017
-
www.windley.com www.windley.com
-
The Provisional Trust Framework is a set of legal documents that provide the foundation for Sovrin's trust model.
Read them to understand how they enable self-sovereign identity.
-
- Jun 2017
-
www.windley.com www.windley.com
-
The Sovrin Network has launched in alpha.
-
- May 2017
-
www.urbit.org www.urbit.org
-
While the first step in freedom is the right to be left alone, the second is the power to form new intentional communities, to create and evolve a voluntary definition of public space.
Independence combined with freedom os association
-
- Mar 2017
-
www.windley.com www.windley.com
-
The most important lesson to learn about the press is that they always get it wrong.
Still true.
-
- Feb 2017
-
www.windley.com www.windley.com
-
People who've completed a masters degree have proven their ability to find the answers to large, complex, open-ended problems.
This is the main point.
-
-
www.infoq.com www.infoq.com
-
recoverable
See Your Coffee Shop Doesn’t Use Two-Phase Commit at http://www.enterpriseintegrationpatterns.com/docs/IEEE_Software_Design_2PC.pdf
-
different namespace
This is an XML thing
-
405
Method Not Allowed
-
In addition, this representation contains the URI of a resource with which Starbucks expects us to interact to make forward progress with the customer workflow; we'll use this URI later.
This is the <next/> element.
-
-
www.windley.com www.windley.com
-
Trust frameworks are all around us, but they are one-offs, too specialized to be universally applicable.
-
- Jun 2016
-
www.windley.com www.windley.com
-
I decided I'd try a second one
Sometimes being an early adopter is expensive.
-
- May 2016
-
www.windley.com www.windley.com
-
principles
I don't consider this list to be in order of importance.
-
-
www.windley.com www.windley.com
-
Spimes can belong to more than one collection.
Picos form a network in their connections, not a hierarchy.
-
they are continually listening for events
This always-on nature of picos gives them a lifetime that can be measured in years, rather than seconds, hours, or days. A pico's lifetime can easily run concurrent with the lifetime of the physical object it reflects.
-
A spime is a computational object that can track the meta data about a physical object or concept through space and time.
Bruce describes spimes in his book "Shaping Things." Free PDFs of the book are available online, or you can get a hardcopy at Amazon.
-
multi-sensor array (MSA) that includes two temperature transducers (one on a probe), a pressure transducer, and a humidity transducer.
I'm planning to install this one, at least for a time, in my beehive to monitor the internal temperature.
-
- Apr 2016
-
www.windley.com www.windley.com
-
Please note that this doesn't require that the self-sovereign identity be controlled by the state
In fact, if it is, then it will no longer be self-sovereign.
-
our modern system of birth certificates
I'm not sure every country calls them "birth certificates" but all modern nations have some kind of birth registration.
-
-
www.windley.com www.windley.com
-
don't have to survive Sybil attacks since the validators are known--there are no pseudonymous validators.
I didn't say it explicitly, but the consequence is that permissioned blockchains don't need proof of work.
-
- Feb 2016
-
kelly.flanagan.io kelly.flanagan.io
-
create a product that homeowners would want to purchase because it excited them, and by the way it contained a network router / coordinator.
Trojan horse
-
-
medium.com medium.com
-
All companies are afraid of disruption, even when they talk about embracing it.
Whistling through the graveyard
-
ne that radically changes the whole world by putting everything in it a distance apart of zero
See Giant Zero
-
customers and users (not necessarily the same thing — there’s a Venn overlap there) haven’t showed up as fully independent, autonomous and respectable participants in the marketplace.
Web 2.0 has ensured they don't have the tools to do so.
-
Now it’s about how we build and control what we need to live fully human lives online.
Nice quote from Doc. The online world is new and it's not clear how we can do this.
-
- Jan 2016
-
le.utah.gov le.utah.govHB02255
-
Computer property
The use of property is problematic since it brings to mind physical property and all of the things listed are intangible and don't behave like physical goods at all. Specifically, you can easily make multiple copies of digital goods without diminishing the original. Also, it's unclear in later uses of "property" whether they are referring to this definition.
-
(e) electronically publishes, posts, or otherwise makes available personal identifying213 information in a public online site or forum.
So, if I post a picture of a high school basketball team on Twitter and say "John, Tom, and Gary screwed up and lost tonight" and they think that's "annoying" I could be charged?
-
with or without authorization
If I have authorization (as defined above) how could it be unlawful? Could I be charged or liable for accidentally deleting a file?
-
property
Is this use of the word "property" meant to be the "computer property" defined previously?
-
network resource or system
Why isn't this using the language carefully defined above?
-
-
www.windley.com www.windley.com
-
harder to draw
Here's Hugh McLeod's great rendition
-
-
www.windley.com www.windley.com
-
This isn't hard to do technically and could be accomplished in several ways.
The easiest way would be to publish a JSON format for transcripts along with a defined way to sign the electronic transcript using the institution's key.
-
- Nov 2015
-
www.windley.com www.windley.com
-
computing environment will be ambient.
Deeper discussion of ambient computing and what it means to personal freedom on the Internet of Thigns
-