42 Matching Annotations
  1. Aug 2020
    1. Sovereignty defines the source of our authority to act

      This is a key idea that is lost in most identity discussions. Every administrative ID system has authority to act within their own domain. But by what authority are people acting? By their own authority.

  2. Aug 2019
  3. Dec 2018
  4. Jun 2018
    1. Elections have consequences and the ability to influence an election is enticing to those who have a stake in the outcome of an election.

      Since I wrote this, we've seen that state actors are willing to spend large amounts to influence elections.

  5. May 2018
  6. Apr 2018
    1. within which the sovereign has complete control and outside of which the sovereign relates to others within established rules and norms

      By way of example, the same action might be a police action within a nation's border or an act or war without.

  7. Mar 2018
    1. encrypt a subset of files in a Git repository such that only specific collaborators can decrypt them

      This is great. I had no idea. Thanks for pointing this out.

  8. Nov 2017
    1. While we often speak of privacy, we don't often link it to control. Privacy protects control and control protects privacy.

      This is a point about sovereignty that is often overlooked.

  9. Sep 2017
    1. Privacy protects control and control protects privacy.

      Privacy and control are two sides of the same coin.

  10. Aug 2017
    1. For people, the lack of trust in social login might be from fear of identity correlation, fear of what data will be shared, or lack of trust in the security of the social login platform. For relying parties, the lack of trust may result from the perception that the identity provider performs insufficient identity proofing or the fear of outsourcing a critical security function (user authentication) to a third party. An additional concern is allowing a third party of have administrative authority for the relying party's users—not being in control of a critical piece of infrastructure. That is, they don't trust that the rules of the game might change arbitrarily based on the fluctuating business demands of the identity provider.3

      Why social login is not seen as legitimate by some users and relying parties.

  11. Jul 2017
    1. The Provisional Trust Framework is a set of legal documents that provide the foundation for Sovrin's trust model.

      Read them to understand how they enable self-sovereign identity.

  12. Jun 2017
  13. May 2017
    1. While the first step in freedom is the right to be left alone, the second is the power to form new intentional communities, to create and evolve a voluntary definition of public space.

      Independence combined with freedom os association

  14. Mar 2017
    1. The most important lesson to learn about the press is that they always get it wrong.

      Still true.

  15. Feb 2017
    1. People who've completed a masters degree have proven their ability to find the answers to large, complex, open-ended problems.

      This is the main point.

    1. recoverable

      See Your Coffee Shop Doesn’t Use Two-Phase Commit at http://www.enterpriseintegrationpatterns.com/docs/IEEE_Software_Design_2PC.pdf

    2. different namespace

      This is an XML thing

    3. 405

      Method Not Allowed

    4. In addition, this representation contains the URI of a resource with which Starbucks expects us to interact to make forward progress with the customer workflow; we'll use this URI later.

      This is the <next/> element.

    1. Trust frameworks are all around us, but they are one-offs, too specialized to be universally applicable.
  16. Jun 2016
  17. May 2016
    1. Spimes can belong to more than one collection.

      Picos form a network in their connections, not a hierarchy.

    2. they are continually listening for events

      This always-on nature of picos gives them a lifetime that can be measured in years, rather than seconds, hours, or days. A pico's lifetime can easily run concurrent with the lifetime of the physical object it reflects.

    3. A spime is a computational object that can track the meta data about a physical object or concept through space and time.

      Bruce describes spimes in his book "Shaping Things." Free PDFs of the book are available online, or you can get a hardcopy at Amazon.

    4. multi-sensor array (MSA) that includes two temperature transducers (one on a probe), a pressure transducer, and a humidity transducer.

      I'm planning to install this one, at least for a time, in my beehive to monitor the internal temperature.

  18. Apr 2016
    1. Please note that this doesn't require that the self-sovereign identity be controlled by the state

      In fact, if it is, then it will no longer be self-sovereign.

    2. our modern system of birth certificates

      I'm not sure every country calls them "birth certificates" but all modern nations have some kind of birth registration.

    1. don't have to survive Sybil attacks since the validators are known--there are no pseudonymous validators.

      I didn't say it explicitly, but the consequence is that permissioned blockchains don't need proof of work.

  19. Feb 2016
    1. create a product that homeowners would want to purchase because it excited them, and by the way it contained a network router / coordinator.

      Trojan horse

    1. All companies are afraid of disruption, even when they talk about embracing it.

      Whistling through the graveyard

    2. ne that radically changes the whole world by putting everything in it a distance apart of zero
    3. customers and users (not necessarily the same thing — there’s a Venn overlap there) haven’t showed up as fully independent, autonomous and respectable participants in the marketplace.

      Web 2.0 has ensured they don't have the tools to do so.

    4. Now it’s about how we build and control what we need to live fully human lives online.

      Nice quote from Doc. The online world is new and it's not clear how we can do this.

  20. Jan 2016
    1. Computer property

      The use of property is problematic since it brings to mind physical property and all of the things listed are intangible and don't behave like physical goods at all. Specifically, you can easily make multiple copies of digital goods without diminishing the original. Also, it's unclear in later uses of "property" whether they are referring to this definition.

    2.  (e) electronically publishes, posts, or otherwise makes available personal identifying213     information in a public online site or forum.

      So, if I post a picture of a high school basketball team on Twitter and say "John, Tom, and Gary screwed up and lost tonight" and they think that's "annoying" I could be charged?

    3. with or without authorization

      If I have authorization (as defined above) how could it be unlawful? Could I be charged or liable for accidentally deleting a file?

    4. property

      Is this use of the word "property" meant to be the "computer property" defined previously?

    5. network resource or system

      Why isn't this using the language carefully defined above?

    1. This isn't hard to do technically and could be accomplished in several ways.

      The easiest way would be to publish a JSON format for transcripts along with a defined way to sign the electronic transcript using the institution's key.

  21. Nov 2015
    1. computing environment will be ambient.

      Deeper discussion of ambient computing and what it means to personal freedom on the Internet of Thigns